{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:36Z","timestamp":1750309536712,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711622","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"52-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Lattice-Based Strong Designated Verifier Signature Scheme in the Standard Model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7946-5262","authenticated-orcid":false,"given":"Yanhua","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Zhengzhou University of Light Industry, Zhengzhou, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4796-7649","authenticated-orcid":false,"given":"Zhanpeng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhengzhou University of Light Industry, Zhengzhou, Henan, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Chaum David and Hans Van Antwerpen. 1989. Undeniable signatures. In Proceedings of the 9th Annual International Conference Santa Barbara USA 212-216.","DOI":"10.1007\/0-387-34805-0_20"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Jakobsson Markus Kazue Sako and Russell Impagliazzo. 1996. Designated veri\ufb01er proofs and their applications. In Proceedings of the 5th Annual International Conference on the Theory and Applications of Cryptographic Techniques Saragossa Spain 143-154.","DOI":"10.1007\/3-540-68339-9_13"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Laguillaumie Fabien and Damien Vergnaud. 2004. Designated verifier signatures: anonymity and efficient construction from any bilinear map. In Proceedings of the 4th International Conference on Security in Communication Networks Amalfi Italy 105-119.","DOI":"10.1007\/978-3-540-30598-9_8"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd Ivan Helene Haagh Rebekah Mercer Anca Nitulescu Claudio Orlandi and Sophia Yakoubov. 2020. Stronger security and constructions of multi-designated verifier signatures. In Proceedings of the 18th International Conference on Theory of Cryptography Durham USA 229-260.","DOI":"10.1007\/978-3-030-64378-2_9"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Han-Yu Lin. 2021. Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systems. International Journal of Distributed Sensor Networks 1-17.","DOI":"10.1177\/15501477211001760"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Rasslan Mohamed and Mahmoud M. Nasreldin. 2022. Comments on the cryptanalysis of an identity-based strong designated verifier signature scheme. In Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks Leuven Belgium 128-131.","DOI":"10.1016\/j.procs.2021.12.219"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Can Zhao Xiaoxiao Wang Zhengzhu Lu Jiahui Wang Dejun Wang and Bo Meng. 2023. HSDVS-DPoS: a secure and heterogeneous DPoS consensus protocol using heterogeneous strong designated verifier signature. In Proceedings of the 2023 Future of Information and Communication Conference San Francisco USA 541-562.","DOI":"10.1007\/978-3-031-28073-3_38"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Joseph David Rafael Misoczki Marc Manzano Joe Tricot Fernando Dominguez Pinuaga Olivier Lacombe Stefan Leichenauer Jack Hidary Phil Venables and Royal Hansen. 2022. Transitioning organizations to post-quantum cryptography. Nature 237-243.","DOI":"10.1038\/s41586-022-04623-2"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Gentry Craig Chris Peikert and Vinod Vaikuntanathan. 2008. Trapdoor for hard lattices and new cryptographic constructions. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing Victoria Canada 197-206.","DOI":"10.1145\/1374376.1374407"},{"key":"e_1_3_3_1_11_2","unstructured":"Fenghe Wang Yupu Hu Baocang Wang. 2012. Lattice-based strong designate verifier signature and its applications. Malaysian Journal of Computer Science 11-22."},{"key":"e_1_3_3_1_12_2","unstructured":"Mingxiang Li Yanjuan Zhang Ming Xu. 2013. Lattice-based strong designated verifier signature scheme. Journal of Chinese Computer Systems 2363-2366."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Noh Geontae and Ik Rae Jeong. 2016. Strong designated veri\ufb01er signature scheme from lattices in the standard model. Security and Communication Networks 6202-6214.","DOI":"10.1002\/sec.1766"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Cai Jie Han Jiang Pingyuan Zhang Zhihua Zheng Guangshi L\u00fc and Qiuliang Xu. 2019. An efficient strong designated verifier signature based on R-SIS assumption. IEEE Access 3938-3947.","DOI":"10.1109\/ACCESS.2018.2889242"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Cai Jie Han Jiang Pingyuan Zhang Zhihua Zheng Hao Wang Guangshi L\u00fc and Qiuliang Xu. 2019. ID-based strong designated verifier signature over R-SIS assumption. Security and Communication Networks 9678095.","DOI":"10.1155\/2019\/9678095"},{"key":"e_1_3_3_1_16_2","unstructured":"Ping Zhang Huanhuan Chi Jinbo Li and Youlin Shang. 2023. Lattice based strong designated verifier signature scheme. Journal of Beijing University of Aeronautics and Astronautics 1294-1300."},{"key":"e_1_3_3_1_17_2","unstructured":"Yanhua Zhang Yan Chen Ximeng Liu Yifeng Yin and Yupu Hu. 2023. Identity-based chameleon signature schemes over lattices. Journal of Electronics and Information Technology 1-8."},{"key":"e_1_3_3_1_18_2","unstructured":"Zhang Yanhua Chen Yan Liu Ximeng Yifeng Yin and Yupu Hu. 2024. Chameleon Signature Schemes over Lattices in the Standard Model. Journal of Electronics and Information Technology."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Ajtai Mikl\u00f3s. 1996. Generating hard instances of lattice problems. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing Philadelphia USA 99-108.","DOI":"10.1145\/237814.237838"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Regev Oded. 2005. On lattices learning with errors random linear codes and cryptography. In Proceedings of the 37th Annual ACM Symposium on Theory of Computing Baltimore USA 84-93.","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Alwen Jo\u00ebl and Chris Peikert. 2011. Generating shorter bases for hard random lattices. Theory of Computing Systems 535-553.","DOI":"10.1007\/s00224-010-9278-3"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Micciancio Daniele and Chris Peikert. 2012. Trapdoor for lattices: simpler tighter faster smaller. In Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques 700-718.","DOI":"10.1007\/978-3-642-29011-4_41"}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","acronym":"ICCNS 2024","location":"Xiamen Shanghai China"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711622","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:29Z","timestamp":1750295909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":21,"alternative-id":["10.1145\/3711618.3711622","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711622","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}