{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T03:29:45Z","timestamp":1778902185278,"version":"3.51.4"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T00:00:00Z","timestamp":1563321600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T00:00:00Z","timestamp":1563321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61379141 and No. 61772521"],"award-info":[{"award-number":["No. 61379141 and No. 61772521"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecur"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s42400-019-0037-8","type":"journal-article","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T14:03:18Z","timestamp":1563372198000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An efficient full dynamic group signature scheme over ring"],"prefix":"10.1186","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6972-0909","authenticated-orcid":false,"given":"Yiru","family":"Sun","sequence":"first","affiliation":[]},{"given":"Yanyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,17]]},"reference":[{"key":"37_CR1","unstructured":"An Efficient Protocol for Anonymously Providing Assurance of the Container of a Private Key. https:\/\/www.researchgate.net\/publication\/243775241 . Accessed 2004."},{"key":"37_CR2","first-page":"255","volume-title":"Proceedings of Conference CRYPTO: 20-24 August 2000; California","author":"G Ateniese","year":"2000","unstructured":"Ateniese, G, Camenisch J, Joye M, Tsudik G (2000) A practical and provably secure coalition-resistant group signature scheme. In: Bellare M (ed)Proceedings of Conference CRYPTO: 20-24 August 2000; California, 255\u2013270.. Springer, Beilin Heidelberg."},{"key":"37_CR3","first-page":"136","volume-title":"Proceedings of Conference CT-RSA: 14-18 February 2005; San Francisco","author":"M Bellare","year":"2005","unstructured":"Bellare, M, Shi HX, Zhang C (2005) Foundations of group signatures: the case of dynamic groups. In: Menezes A (ed)Proceedings of Conference CT-RSA: 14-18 February 2005; San Francisco, 136\u2013153.. Springer, Beilin Heidelberg."},{"key":"37_CR4","first-page":"381","volume-title":"Proceedings of Conference SCN: 13-15 September 2010; Amalfi","author":"P Bichsel","year":"2010","unstructured":"Bichsel, P, Camenisch J, Neven G, Smart NP, Warinschi B (2010) Get shorty via group signatures without encryption. In: Garay JA Prisco RD (eds)Proceedings of Conference SCN: 13-15 September 2010; Amalfi, 381\u2013398.. Springer, Beilin Heidelberg."},{"key":"37_CR5","first-page":"41","volume-title":"Proceedings of Conference CRYPTO: 15-19 August 2004; California","author":"D Boneh","year":"2004","unstructured":"Boneh, D, Boyen X, Shacham H (2004) Short group signatures. In: Franklin M (ed)Proceedings of Conference CRYPTO: 15-19 August 2004; California, 41\u201355.. Springer, Beilin Heidelberg."},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D, Shacham H (2004) Group signatures with verifier-local revocation In: Proceedings of Conference CCS: 25-29 October 2004; Washington DC, 168\u2013177.. ACM DL.","DOI":"10.1145\/1030083.1030106"},{"key":"37_CR7","first-page":"117","volume-title":"Proceedings of Conference ACNS: 19-22 June 2016; Guildford","author":"J Bootle","year":"2016","unstructured":"Bootle, J, Cerulli A, Chaidos P, Ghadafi E, Groth J (2016) Foundations of fully dynamic group signatures. In: Manulis M, Sadeghi AR, Schneider S (eds)Proceedings of Conference ACNS: 19-22 June 2016; Guildford, 117\u2013136.. Springer, Beilin Heidelberg."},{"key":"37_CR8","first-page":"427","volume-title":"Proceedings of Conference EUROCRYPT: 28 May-1 June 2006; St.Petersburg","author":"X Boyen","year":"2006","unstructured":"Boyen, X, Waters B (2006) Compact group signatures without random oracles. In: Vaudenay S (ed)Proceedings of Conference EUROCRYPT: 28 May-1 June 2006; St.Petersburg, 427\u2013444.. Springer, Beilin Heidelberg."},{"key":"37_CR9","first-page":"1","volume-title":"Proceedings of Conference PKC: 16-20 April 2007; Beijing","author":"X Boyen","year":"2007","unstructured":"Boyen, X, Waters B (2007) Full-domain subgroup hiding and constant-size group signatures. In: Okamoto T Wang XT (eds)Proceedings of Conference PKC: 16-20 April 2007; Beijing, 1\u201315.. Springer, Beilin Heidelberg."},{"key":"37_CR10","first-page":"190","volume-title":"Proceedings of Conference PKC: 13-15 February 2001; Cheju Island","author":"E Bresson","year":"2001","unstructured":"Bresson, E, Stern J (2001) Efficient revocation in group signatures. In: Kim K (ed)Proceedings of Conference PKC: 13-15 February 2001; Cheju Island, 190\u2013206.. Springer, Beilin Heidelberg."},{"key":"37_CR11","first-page":"276","volume-title":"Proceedings of Conference PKC: 18-20 January 2000; Melbourne","author":"E Brickell","year":"2000","unstructured":"Brickell, E, Pointcheval D, Vaudenay S, Yung M (2000) Design validations for discrete logarithm based signature schemes. In: Imai H Zheng YL (eds)Proceedings of Conference PKC: 18-20 January 2000; Melbourne, 276\u2013292.. Springer, Beilin Heidelberg."},{"key":"37_CR12","first-page":"120","volume-title":"Proceedings of Conference SCN: 8-10 September 2004; Amalfi","author":"J Camenisch","year":"2004","unstructured":"Camenisch, J, Groth J (2004) Group signatures: better efficiency and new theoretical aspects. In: Blundo C Cimato S (eds)Proceedings of Conference SCN: 8-10 September 2004; Amalfi, 120\u2013133.. Springer, Beilin Heidelberg."},{"key":"37_CR13","first-page":"61","volume-title":"Proceedings of Conference CRYPTO: 18-22 August 2002; California","author":"J Camenisch","year":"2002","unstructured":"Camenisch, J, Lysyanskaya A (2002) Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung M (ed)Proceedings of Conference CRYPTO: 18-22 August 2002; California, 61\u201376.. Springer, Beilin Heidelberg."},{"key":"37_CR14","first-page":"56","volume-title":"Proceedings of Conference CRYPTO: 15-19 August 2004; California","author":"J Camenisch","year":"2004","unstructured":"Camenisch, J, Lysyanskaya A (2004) Signature schemes and anonymous credentials from bilinear maps. In: Franklin M (ed)Proceedings of Conference CRYPTO: 15-19 August 2004; California, 56\u201372.. Springer, Beilin Heidelberg."},{"key":"37_CR15","first-page":"160","volume-title":"Proceedings of Conference ASIACRYPT: 18-22 October 1998; Beijing","author":"J Camenisch","year":"1998","unstructured":"Camenisch, J, Michels M (1998) A group signature scheme with improved efficiency. In: Ohta K Pei DY (eds)Proceedings of Conference ASIACRYPT: 18-22 October 1998; Beijing, 160\u2013174.. Springer, Beilin Heidelberg."},{"key":"37_CR16","first-page":"410","volume-title":"Proceedings of Conference CRYPTO: 17-21 August 1997; California","author":"J Camenisch","year":"1997","unstructured":"Camenisch, J, Stadler M (1997) Efficient group signature schemes for large groups (extended abstract). In: KaliskiJr BS (ed)Proceedings of Conference CRYPTO: 17-21 August 1997; California, 410\u2013424.. Springer, Beilin Heidelberg."},{"key":"37_CR17","first-page":"57","volume-title":"Proceedings of Conference SCN: 5-7 September 2012; Amalfi","author":"J Camenisch","year":"2012","unstructured":"Camenisch, J, Neven G, R\u00fcckert M (2012) Fully anonymous attribute tokens from lattices. In: Visconti I Prisco RD (eds)Proceedings of Conference SCN: 5-7 September 2012; Amalfi, 57\u201375.. Springer, Beilin Heidelberg."},{"key":"37_CR18","first-page":"257","volume-title":"Proceedings of Conference EUROCRYPT: 8-11 April 1991; Brighton","author":"D Chaum","year":"1991","unstructured":"Chaum, D, van Heyst EV (1991) Group signatures. In: Davies DW (ed)Proceedings of Conference EUROCRYPT: 8-11 April 1991; Brighton, 257\u2013265.. Springer, Beilin Heidelberg."},{"key":"37_CR19","first-page":"171","volume-title":"Proceedings of Conference EUROCRYPT: 9-12 May 1994; Perugia","author":"L Chen","year":"1994","unstructured":"Chen, L, Pedersen TP (1994) New group signature schemes. In: Santis AD (ed)Proceedings of Conference EUROCRYPT: 9-12 May 1994; Perugia, 171\u2013181.. Springer, Beilin Heidelberg."},{"key":"37_CR20","first-page":"193","volume-title":"Proceedings of Conference VIETCRYPT: 25-28 September 2006; Hanoi","author":"C Delerabl\u00e9e","year":"2006","unstructured":"Delerabl\u00e9e, C, Pointcheval D (2006) Dynamic fully anonymous short group signatures. In: Nguyen PQ (ed)Proceedings of Conference VIETCRYPT: 25-28 September 2006; Hanoi, 193\u2013210.. Springer, Beilin Heidelberg."},{"key":"37_CR21","first-page":"609","volume-title":"Proceedings of Conference EUROCRYPT: 2-6 May 2004; Interlaken","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y, Kiayias A, Nicolosi A, Shoup V (2004) Anonymous identification in ad hoc groups. In: Cachin C Camenisch JL (eds)Proceedings of Conference EUROCRYPT: 2-6 May 2004; Interlaken, 609\u2013626.. Springer, Beilin Heidelberg."},{"key":"37_CR22","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1093\/ietfec\/e89-a.5.1328","volume":"E89-A","author":"J Furukawa","year":"2005","unstructured":"Furukawa, J, Imai H (2005) An efficient group signature scheme from bilinear maps. IEICE Trans Fundam Electron Commun Comput Sci E89-A:1328\u20131338.","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"37_CR23","first-page":"77","volume-title":"Proceedings of Conference SCN: 8-10 September 2004; Amalfi","author":"J Furukawa","year":"2004","unstructured":"Furukawa, J, Yonezawa S (2004) Group signatures with separate and distributed authorities. In: Blundo C Cimato S (eds)Proceedings of Conference SCN: 8-10 September 2004; Amalfi, 77\u201390.. Springer, Beilin Heidelberg."},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Gentry, C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions In: Proceedings of Conference STOC: 17-20 May 2008; Victoria, 197\u2013206.. ACM DL.","DOI":"10.1145\/1374376.1374407"},{"key":"37_CR25","first-page":"395","volume-title":"Proceedings of Conference ASIACRYPT: 5-9 December 2010; Singapore","author":"SD Gordon","year":"2010","unstructured":"Gordon, SD, Katz J, Vaikuntanathan V (2010) A group signature scheme from lattice assumptions. In: Abe M (ed)Proceedings of Conference ASIACRYPT: 5-9 December 2010; Singapore, 395\u2013412.. Springer, Beilin Heidelberg."},{"key":"37_CR26","first-page":"444","volume-title":"Proceedings of Conference ASIACRYPT: 3-7 December 2006; Shanghai","author":"J Groth","year":"2006","unstructured":"Groth, J (2006) Simulation-sound nizk proofs for a practical language and constant size group signatures. In: Lai XJ Chen KF (eds)Proceedings of Conference ASIACRYPT: 3-7 December 2006; Shanghai, 444\u2013459.. Springer, Beilin Heidelberg."},{"key":"37_CR27","first-page":"164","volume-title":"Proceedings of Conference ASIACRYPT: 2-6 December 2007; Kuching","author":"J Groth","year":"2007","unstructured":"Groth, J (2007) Fully anonymous group signatures without random oracles. In: Kurosawa K (ed)Proceedings of Conference ASIACRYPT: 2-6 December 2007; Kuching, 164\u2013180.. Springer, Beilin Heidelberg."},{"key":"37_CR28","first-page":"372","volume-title":"Proceedings of Conference ASIACRYPT: 7-11 December 2008; Singapore","author":"A Kawachi","year":"2008","unstructured":"Kawachi, A, Tanaka K, Xagawa K (2008) Concurrently secure identification schemes based on the worst-case hardness of lattice problems. In: Pieprzyk J (ed)Proceedings of Conference ASIACRYPT: 7-11 December 2008; Singapore, 372\u2013389.. Springer, Beilin Heidelberg."},{"key":"37_CR29","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1504\/IJSN.2006.010821","volume":"1","author":"A Kiayias","year":"2006","unstructured":"Kiayias, A, Yung M (2006) Secure scalable group signature with dynamic joins and separable authorities. Secur Netw 1:24\u201345.","journal-title":"Secur Netw"},{"key":"37_CR30","first-page":"41","volume-title":"Proceedings of Conference ASIACRYPT: 1-5 December 2013; Bengaluru","author":"F Laguillaumie","year":"2013","unstructured":"Laguillaumie, F, Langlois A, Libert B, Stehl\u00e9 D (2013) Lattice-based group signatures with logarithmic signature size. In: Sako K Sarkar P (eds)Proceedings of Conference ASIACRYPT: 1-5 December 2013; Bengaluru, 41\u201361.. Springer, Beilin Heidelberg."},{"key":"37_CR31","first-page":"345","volume-title":"Proceedings of Conference PKC: 26-28 March 2014; Buenos","author":"A Langlois","year":"2014","unstructured":"Langlois, A, Ling S, Nguyen K, Wang H (2014) Lattice-based group signature scheme with verifier-local revocation. In: Krawczyk H (ed)Proceedings of Conference PKC: 26-28 March 2014; Buenos, 345\u2013361.. Springer, Beilin Heidelberg."},{"key":"37_CR32","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-662-53890-6_13","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"Beno\u00eet Libert","year":"2016","unstructured":"Libert, B, Ling S, Mouhartem F, Nguyen K, Wang H (2016a) Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions. In: Cheon JH Takagi T (eds)Proceedings of Conference ASIACRYPT: 4-8 December 2016; Hanoi, 373\u2013403.. Springer, Beilin Heidelberg."},{"key":"37_CR33","first-page":"1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"Beno\u00eet Libert","year":"2016","unstructured":"Libert, B, Ling S, Nguyen K, Wang H (2016b) Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Fischlin M Coron JS (eds)Proceedings of Conference EUROCRYPT: 8-12 May 2016; Vienna, 1\u201331.. Springer, Beilin Heidelberg."},{"key":"37_CR34","first-page":"571","volume-title":"Lecture Notes in Computer Science","author":"Beno\u00eet Libert","year":"2012","unstructured":"Libert, B, Peters T, Yung M (2012a) Group signatures with almost-for-free revocation. In: Naini RS Canetti R (eds)Proceedings of Conference CRYPTO: 19-23 August 2012; Santa Barbara, 571\u2013589.. Springer, Beilin Heidelberg."},{"key":"37_CR35","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-642-29011-4_36","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"Beno\u00eet Libert","year":"2012","unstructured":"Libert, B, Peters T, Yung M (2012b) Scalable group signatures with revocation. In: Pointcheval D Johansson T (eds)Proceedings of Conference EUROCRYPT: 15-19 April 2012; Cambridge, 609\u2013627.. Springer, Beilin Heidelberg."},{"key":"37_CR36","first-page":"498","volume-title":"Proceedings of Conference CANS: 12-14 December 2009; Kanazawa","author":"B Libert","year":"2009","unstructured":"Libert, B, Vergnaud D (2009) Group signatures with verifier-local revocation and backward unlinkability in the standard model. In: Garay JA, Miyaji A, Otsuka A (eds)Proceedings of Conference CANS: 12-14 December 2009; Kanazawa, 498\u2013517.. Springer, Beilin Heidelberg."},{"key":"37_CR37","first-page":"427","volume-title":"Proceedings of Conference PKC: 30 March-1 April 2015; Gaithersburg","author":"S Ling","year":"2015","unstructured":"Ling, S, Nguyen K, Wang HX (2015) Group signatures from lattices: simpler, tighter, shorter, ring-based. In: Katz J (ed)Proceedings of Conference PKC: 30 March-1 April 2015; Gaithersburg, 427\u2013449.. Springer, Beilin Heidelberg."},{"key":"37_CR38","first-page":"293","volume-title":"Proceedings of Conference ACNS: 10-12 July 2017; Kanazawa","author":"S Ling","year":"2017","unstructured":"Ling, S, Nguyen K, Wang H, Xu Y (2017) Lattice-based group signatures: achieving full dynamicity with ease. In: Gollmann D, Miyaji A, Kikuchi H (eds)Proceedings of Conference ACNS: 10-12 July 2017; Kanazawa, 293\u2013312.. Springer, Beilin Heidelberg."},{"key":"37_CR39","first-page":"162","volume-title":"Proceedings of Conference PKC: 9-12 March 2008; Barcelona","author":"V Lyubashevsky","year":"2008","unstructured":"Lyubashevsky, V (2008) Lattice-based identification schemes secure under active attacks. In: Cramer R (ed)Proceedings of Conference PKC: 9-12 March 2008; Barcelona, 162\u2013179.. Springer, Beilin Heidelberg."},{"key":"37_CR40","first-page":"738","volume-title":"Proceedings of Conference EUROCRYPT: 15-19 April 2012; Cambridge","author":"V Lyubashevsky","year":"2012","unstructured":"Lyubashevsky, V (2012) Lattice signatures without trapdoors. In: Pointcheval D Johansson T (eds)Proceedings of Conference EUROCRYPT: 15-19 April 2012; Cambridge, 738\u2013755.. Springer, Beilin Heidelberg."},{"key":"37_CR41","first-page":"144","volume-title":"Proceedings of Conference ICALP: 10-14 July 2006; Venice","author":"V Lyubashevsky","year":"2006","unstructured":"Lyubashevsky, V, Micciancio D (2006) Generalized compact knapsacks are collision resistant. In: Bugliesi M, Preneel B, Sassone V, Wegener I (eds)Proceedings of Conference ICALP: 10-14 July 2006; Venice, 144\u2013155.. Springer, Beilin Heidelberg."},{"key":"37_CR42","first-page":"1","volume-title":"Proceedings of Conference EUROCRYPT: 30 May-3 June 2010; Riviera","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky, V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Gilbert H (ed)Proceedings of Conference EUROCRYPT: 30 May-3 June 2010; Riviera, 1\u201323.. Springer, Beilin Heidelberg."},{"key":"37_CR43","first-page":"35","volume-title":"Proceedings of Conference EUROCRYPT: 26-30 May 2013; Athens","author":"V Lyubashevsky","year":"2013","unstructured":"Lyubashevsky, V, Peikert C, Regev O (2013) A toolkit for ring-lwe cryptography. In: Johansson T Nguyen PQ (eds)Proceedings of Conference EUROCRYPT: 26-30 May 2013; Athens, 35\u201354.. Springer, Beilin Heidelberg."},{"key":"37_CR44","first-page":"533","volume-title":"Proceedings of Conference ASIACRYPT: 4-8 December 2005; Chennai","author":"T Nakanishi","year":"2005","unstructured":"Nakanishi, T, Funabiki N (2005) Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In: Roy B (ed)Proceedings of Conference ASIACRYPT: 4-8 December 2005; Chennai, 533\u2013548.. Springer, Beilin Heidelberg."},{"key":"37_CR45","first-page":"463","volume-title":"Proceedings of Conference PKC: 18-20 March 2009; Irvine","author":"T Nakanishi","year":"2009","unstructured":"Nakanishi, T, Fujii H, Hira Y, Funabiki N (2009) Revocable group signature schemes with constant costs for signing and verifying. In: Jarecki S Tsudik G (eds)Proceedings of Conference PKC: 18-20 March 2009; Irvine, 463\u2013480.. Springer, Beilin Heidelberg."},{"key":"37_CR46","first-page":"41","volume-title":"Proceedings of Conference CRYPTO: 19-23 August 2001; Santa Barbara","author":"D Naor","year":"2001","unstructured":"Naor, D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Kilian J (ed)Proceedings of Conference CRYPTO: 19-23 August 2001; Santa Barbara, 41\u201362.. Springer, Beilin Heidelberg."},{"key":"37_CR47","doi-asserted-by":"crossref","unstructured":"Naor, M, Yung M (1990) Public-key cryptosystems provably secure against chosen ciphertext attacks In: Proceedings of Conference STOC: 1990; Baltimore, 427\u2013437.. ACM DL.","DOI":"10.1145\/100216.100273"},{"key":"37_CR48","first-page":"275","volume-title":"Proceedings of Conference CT-RSA: 14-18 February 2005; San Francisco","author":"L Nguyen","year":"2005","unstructured":"Nguyen, L (2005) Accumulators from bilinear pairings and applications. In: Menezes A (ed)Proceedings of Conference CT-RSA: 14-18 February 2005; San Francisco, 275\u2013292.. Springer, Beilin Heidelberg."},{"key":"37_CR49","first-page":"372","volume-title":"Proceedings of Conference ASIACRYPT: 5-9 December 2004; Jeju Island","author":"L Nguyen","year":"2004","unstructured":"Nguyen, L, Naini RS (2004) Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee PJ (ed)Proceedings of Conference ASIACRYPT: 5-9 December 2004; Jeju Island, 372\u2013386.. Springer, Beilin Heidelberg."},{"key":"37_CR50","first-page":"401","volume-title":"Proceedings of Conference PKC: 30 March-1 April 2015; Gaithersburg","author":"PQ Nguyen","year":"2015","unstructured":"Nguyen, PQ, Zhang J, Zhang Z (2015) Simpler efficient group signatures from lattices. In: Katz J (ed)Proceedings of Conference PKC: 30 March-1 April 2015; Gaithersburg, 401\u2013426.. Springer, Beilin Heidelberg."},{"key":"37_CR51","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1561\/0400000074","volume":"10","author":"C Peikert","year":"2016","unstructured":"Peikert, C (2016) A decade of lattice cryptography. Found Trends Theor Comput Sci 10:283\u2013424.","journal-title":"Found Trends Theor Comput Sci"},{"key":"37_CR52","first-page":"145","volume-title":"Proceedings of Conference TCC: 4-7 March 2006; New York","author":"C Peikert","year":"2006","unstructured":"Peikert, C, Rosen A (2006) Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi S Rabin T (eds)Proceedings of Conference TCC: 4-7 March 2006; New York, 145\u2013166.. Springer, Beilin Heidelberg."},{"key":"37_CR53","first-page":"478","volume-title":"Proceedings of Conference STOC: 11-13 June 2007; San Diego","author":"C Peikert","year":"2007","unstructured":"Peikert, C, Rosen A (2007) Lattices that admit logarithmic worst-case to average-case connection factors In: Proceedings of Conference STOC: 11-13 June 2007; San Diego, 478\u2013487.. ACM DL, Beilin Heidelberg."},{"key":"37_CR54","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D, Stern J (2000) Security arguments for digital signatures and blind signatures. Cryptology 13:361\u2013396.","journal-title":"Cryptology"},{"key":"37_CR55","unstructured":"Practical Group Signatures Without Random Oracles. http:\/\/citeseerx.ist.psu.edu\/viewdoc . Accessed 2005."},{"key":"37_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM 56:1\u201340.","journal-title":"J ACM"},{"key":"37_CR57","first-page":"715","volume-title":"Proceedings of Conference PKC: 21-23 May 2012; Darmstadt","author":"Y Sakai","year":"2012","unstructured":"Sakai, Y, Schuldt JCN, Emura K, Hanaoka G, Ohta K (2012) On the security of dynamic group signatures: preventing signature hijacking. In: Fischlin M, Buchmann J, Manulis M (eds)Proceedings of Conference PKC: 21-23 May 2012; Darmstadt, 715\u2013732.. Springer, Beilin Heidelberg."},{"key":"37_CR58","unstructured":"Signing on Elements in Bilinear Groups for Modular Protocol Design. https:\/\/eprint.iacr.org\/2010\/133.pdf . Accessed 2010."},{"key":"37_CR59","doi-asserted-by":"crossref","unstructured":"Song, DX (2001) Practical forward secure group signature schemes In: Proceedings of Conference CCS: 5-8 November 2001; Philadelphia, 225\u2013234.. ACM DL.","DOI":"10.1145\/501983.502015"},{"key":"37_CR60","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.556672","volume":"42","author":"J Stern","year":"1996","unstructured":"Stern, J (1996) A new paradigm for public key identification. IEEE Trans Inf Theory 42:1757\u20131768.","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-019-0037-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s42400-019-0037-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-019-0037-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:03:37Z","timestamp":1695031417000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-019-0037-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,17]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["37"],"URL":"https:\/\/doi.org\/10.1186\/s42400-019-0037-8","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,17]]},"assertion":[{"value":"20 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"21"}}