{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T08:01:18Z","timestamp":1776931278152,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733820.3764678","type":"proceedings-article","created":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T10:15:48Z","timestamp":1771323348000},"page":"48-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Post-Quantum Issuer-Hiding Anonymous Credential Scheme"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2615-7316","authenticated-orcid":false,"given":"The-Anh","family":"Ta","sequence":"first","affiliation":[{"name":"CSIRO Data61, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0362-2844","authenticated-orcid":false,"given":"Sid","family":"Chau","sequence":"additional","affiliation":[{"name":"CSIRO Data61, Sydney, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2026,2,17]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670297"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_20"},{"key":"e_1_3_3_1_5_2","unstructured":"Osman Bicer and Alptekin Kupcu. [n. d.]. Versatile ABS: Usage Limited Revocable Threshold Traceable Authority Hiding Decentralized Attribute Based Signatures. Cryptology ePrint Archive Paper 2019\/203."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3600188"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92548-2_9"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38545-2_13"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0123"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715698"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.5555\/1754868.1754897"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97121-2_15"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179470"},{"key":"e_1_3_3_1_15_2","unstructured":"Kaoutar Elkhiyaoui Angelo\u00a0De Caro and Elli Androulaki. [n. d.]. Multi-Issuer Anonymous Credentials Without a Root Authority. Cryptology ePrint Archive Paper 2021\/1669."},{"key":"e_1_3_3_1_16_2","volume-title":"CRYPTO \u201922","author":"Espitau Thomas","year":"2022","unstructured":"Thomas Espitau, Mehdi Tibouchi, Alexandre Wallet, and Yang Yu. 2022. Shorter Hash and Signed Lattice Based Signatures. In CRYPTO \u201922."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690364"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38545-2_12"},{"key":"e_1_3_3_1_20_2","unstructured":"Qiqi Lai Chongshen Chen Feng-Hao Liu Anna Lysyanskaya and Zhedong Wang. 2023. Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials. Cryptology ePrint Archive Paper 2023\/766. https:\/\/eprint.iacr.org\/2023\/766"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9938-4"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90453-1_1"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_13"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_6"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22972-5_4"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15979-4_3"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179430"},{"key":"e_1_3_3_1_30_2","volume-title":"Proc. Priv. Enhancing Technol.","author":"Sanders Olivier","year":"2014","unstructured":"Olivier Sanders and Jacques Traore. 2014. Efficient Issuer-Hiding Authentication, Application to Anonymous Credential. In Proc. Priv. Enhancing Technol."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Peter\u00a0W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 26 5 (1997) 1484\u20131509.","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23272"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00114"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_6"}],"event":{"name":"QRSEC '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"QRSEC '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 1st ACM CCS Workshop on Quantum-Resistant Cryptography and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733820.3764678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:49:01Z","timestamp":1775854141000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733820.3764678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":34,"alternative-id":["10.1145\/3733820.3764678","10.1145\/3733820"],"URL":"https:\/\/doi.org\/10.1145\/3733820.3764678","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2026-02-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}