{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T03:29:44Z","timestamp":1778902184200,"version":"3.51.4"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61932019, No.61772521, No.61772522"],"award-info":[{"award-number":["No.61932019, No.61772521, No.61772522"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Key Research Program of Frontier Sciences, CAS","award":["No.QYZDB-SSW-SYS035"],"award-info":[{"award-number":["No.QYZDB-SSW-SYS035"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecur"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Message-dependent opening is one of the solutions to solve the problem of the tracing manager owns excessive power. In this paper, we present a new lattice-based fully dynamic group signature scheme with message-dependent opening by combining an improved version of the fully dynamic group signature scheme proposed by Ling <jats:italic>et al<\/jats:italic> and the double encryption paradigm. In addition, we propose an improved underlying zero knowledge protocol, it has a soundness error <jats:inline-formula><jats:alternatives><jats:tex-math>$\\frac {1}{\\max (n,p)+1}$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mfrac>\n                    <mml:mrow>\n                      <mml:mn>1<\/mml:mn>\n                    <\/mml:mrow>\n                    <mml:mrow>\n                      <mml:mo>max<\/mml:mo>\n                      <mml:mo>(<\/mml:mo>\n                      <mml:mi>n<\/mml:mi>\n                      <mml:mo>,<\/mml:mo>\n                      <mml:mi>p<\/mml:mi>\n                      <mml:mo>)<\/mml:mo>\n                      <mml:mo>+<\/mml:mo>\n                      <mml:mn>1<\/mml:mn>\n                    <\/mml:mrow>\n                  <\/mml:mfrac>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> that is better than the Stern-like protocol, which helps to bring down the communication complexity of the protocol and hence the signature scheme. Our scheme constrains the power of group managers by adding an admitter, and the signature size has a logarithmic relationship with the group size.<\/jats:p>","DOI":"10.1186\/s42400-021-00076-8","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T14:54:51Z","timestamp":1620053691000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An efficient fully dynamic group signature with message dependent opening from lattice"],"prefix":"10.1186","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6972-0909","authenticated-orcid":false,"given":"Yiru","family":"Sun","sequence":"first","affiliation":[]},{"given":"Yanyan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,3]]},"reference":[{"key":"76_CR1","first-page":"183","volume-title":"Proceedings of Conference EUROCRYPT: 10-14 May 2020","author":"W Beullens","year":"2020","unstructured":"Beullens, W (2020) Sigma protocols for mq, pkp and sis, and fishy signature schemes. In: Canteaut A Ishai Y (eds)Proceedings of Conference EUROCRYPT: 10-14 May 2020, 183\u2013211.. Springer, Zagreb."},{"key":"76_CR2","first-page":"117","volume-title":"Proceedings of Conference ACNS: 19-22 June 2016","author":"J Bootle","year":"2016","unstructured":"Bootle, J, Cerulli A, Chaidos P, Ghadafi E, Groth J (2016) Foundations of fully dynamic group signatures. In: Manulis M, Sadeghi A-R, Schneider S (eds)Proceedings of Conference ACNS: 19-22 June 2016, 117\u2013136.. Springer, Guildford."},{"key":"76_CR3","first-page":"276","volume-title":"Proceedings of Conference PKC: 18-20 January 2000","author":"E Brickell","year":"2000","unstructured":"Brickell, E, Pointcheval D, Vaudenay S, Yung M (2000) Design validations for discrete logarithm based signature schemes. In: Imai H Zheng Y (eds)Proceedings of Conference PKC: 18-20 January 2000, 276\u2013292.. Springer, Melbourne."},{"key":"76_CR4","first-page":"207","volume-title":"Proceedings of Conference EUROCRYPT: 2-6 May 2004","author":"R Canetti","year":"2004","unstructured":"Canetti, R, Halevi S, Katz J (2004) Chosen-ciphertext security from identity-based encryption. In: Cachin C Camenisch J (eds)Proceedings of Conference EUROCRYPT: 2-6 May 2004, 207\u2013222.. Springer, Interlaken."},{"key":"76_CR5","first-page":"257","volume-title":"Proceedings of Conference EUROCRYPT: 8-11 April 1991","author":"D Chaum","year":"1991","unstructured":"Chaum, D, van Heyst E (1991) Group signatures. In: Davies DW (ed)Proceedings of Conference EUROCRYPT: 8-11 April 1991, 257\u2013265.. Springer, Brighton."},{"key":"76_CR6","first-page":"395","volume-title":"Proceedings of Conference ASIACRYPT: 5-9 December 2010","author":"SD Gordon","year":"2010","unstructured":"Gordon, SD, Katz J, Vaikuntanathan V (2010) A group signature scheme from lattice assumptions. In: Abe M (ed)Proceedings of Conference ASIACRYPT: 5-9 December 2010, 395\u2013412.. Springer, Singapore."},{"key":"76_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14303-8","volume-title":"Efficient Secure Two-Party Protocols. Information Security and Cryptography","author":"C Hazay","year":"2010","unstructured":"Hazay, C, Lindell Y (2010) Sigma protocols and efficient zero-knowledge In: Efficient Secure Two-Party Protocols. Information Security and Cryptography.. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-14303-8_6."},{"key":"76_CR8","first-page":"312","volume-title":"Proceedings of Conference EUROCRYPT: 19-23 May 2019","author":"S Katsumata","year":"2019","unstructured":"Katsumata, S, Yamada S (2019) Group signatures without nizk: from lattice in the standard model. In: Ishai Y Rijmen V (eds)Proceedings of Conference EUROCRYPT: 19-23 May 2019, 312\u2013344.. Springer, Darmstadt."},{"key":"76_CR9","first-page":"372","volume-title":"Proceedings of Conference ASIACRYPT: 7-11 December 2008","author":"A Kawachi","year":"2008","unstructured":"Kawachi, A, Tanaka K, Xagawa K (2008) Concurrently secure identification schemes based on the worst-case hardness of lattice problems. In: Pieprzyk J (ed)Proceedings of Conference ASIACRYPT: 7-11 December 2008, 372\u2013389.. Springer, Singapore."},{"key":"76_CR10","first-page":"41","volume-title":"Proceedings of Conference ASIACRYPT: 1-5 December 2013","author":"F Laguillaumie","year":"2013","unstructured":"Laguillaumie, F, Langlois A, Libert B, Stehl\u00e9 D (2013) Lattice-based group signatures with logarithmic signature size. In: Sako K Sarkar P (eds)Proceedings of Conference ASIACRYPT: 1-5 December 2013, 41\u201361.. Springer, Bengaluru."},{"key":"76_CR11","first-page":"345","volume-title":"Proceedings of Conference PKC: 26-28 March 2014","author":"A Langlois","year":"2014","unstructured":"Langlois, A, Ling S, Nguyen K, Wang H (2014) Lattice-based group signature scheme with verifier-local revocation. In: Krawczyk H (ed)Proceedings of Conference PKC: 26-28 March 2014, 345\u2013361.. Springer, Buenos."},{"key":"76_CR12","first-page":"286","volume-title":"Proceedings of Conference CT-RSA: 25-28 February 2014","author":"B Libert","year":"2014","unstructured":"Libert, B, Joye M (2014) Group signatures with message-dependent opening in the standard model. In: Benaloh J (ed)Proceedings of Conference CT-RSA: 25-28 February 2014, 286\u2013306.. Springer, San Francisco."},{"key":"76_CR13","first-page":"1","volume-title":"Proceedings of Conference EUROCRYPT: 8-12 May 2016","author":"B Libert","year":"2016","unstructured":"Libert, B, Ling S, Nguyen K, Wang H (2016) Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Fischlin M Coron J-S (eds)Proceedings of Conference EUROCRYPT: 8-12 May 2016, 1\u201331.. Springer, Vienna."},{"key":"76_CR14","first-page":"137","volume-title":"Proceedings of Conference ACNS: 19-22 June 2016","author":"B Libert","year":"2016","unstructured":"Libert, B, Mouhartem F, Nguyen K (2016) A lattice-based group signature scheme with message-dependent opening. In: Manulis M, Sadeghi A-R, Schneider S (eds)Proceedings of Conference ACNS: 19-22 June 2016, 137\u2013155.. Springer, Guildford."},{"key":"76_CR15","first-page":"427","volume-title":"Proceedings of Conference PKC: 30 March-1 April 2015","author":"S Ling","year":"2015","unstructured":"Ling, S, Nguyen K, Wang HX (2015) Group signatures from lattices: simpler, tighter, shorter, ring-based. In: Katz J (ed)Proceedings of Conference PKC: 30 March-1 April 2015, 427\u2013449.. Springer, Gaithersburg."},{"key":"76_CR16","first-page":"293","volume-title":"Proceedings of Conference ACNS: 10-12 July 2017","author":"S Ling","year":"2017","unstructured":"Ling, S, Nguyen K, Wang H, Xu Y (2017) Lattice-based group signatures: achieving full dynamicity with ease. In: Gollmann D, Miyaji A, Kikuchi H (eds)Proceedings of Conference ACNS: 10-12 July 2017, 293\u2013312.. Springer, Kanazawa."},{"key":"76_CR17","first-page":"162","volume-title":"Proceedings of Conference PKC: 9-12 March 2008","author":"V Lyubashevsky","year":"2008","unstructured":"Lyubashevsky, V (2008) Lattice-based identification schemes secure under active attacks. In: Cramer R (ed)Proceedings of Conference PKC: 9-12 March 2008, 162\u2013179.. Springer, Barcelona."},{"key":"76_CR18","first-page":"738","volume-title":"Proceedings of Conference EUROCRYPT: 15-19 April 2012","author":"V Lyubashevsky","year":"2012","unstructured":"Lyubashevsky, V (2012) Lattice signatures without trapdoors. In: Pointcheval D Johansson T (eds)Proceedings of Conference EUROCRYPT: 15-19 April 2012, 738\u2013755.. Springer, Cambridge."},{"key":"76_CR19","first-page":"144","volume-title":"Proceedings of Conference ICALP: 10-14 July 2006","author":"V Lyubashevsky","year":"2006","unstructured":"Lyubashevsky, V, Micciancio D (2006) Generalized compact knapsacks are collision resistant. In: Bugliesi M, Preneel B, Sassone V, Wegener I (eds)Proceedings of Conference ICALP: 10-14 July 2006, 144\u2013155.. Springer, Venice."},{"key":"76_CR20","first-page":"1","volume-title":"Proceedings of Conference EUROCRYPT: 30 May-3 June 2010","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky, V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Gilbert H (ed)Proceedings of Conference EUROCRYPT: 30 May-3 June 2010, 1\u201323.. Riviera, Springer."},{"key":"76_CR21","first-page":"35","volume-title":"Proceedings of Conference EUROCRYPT: 26-30 May 2013","author":"V Lyubashevsky","year":"2013","unstructured":"Lyubashevsky, V, Peikert C, Regev O (2013) A toolkit for ring-lwe cryptography. In: Johansson T Q.Nguyen P (eds)Proceedings of Conference EUROCRYPT: 26-30 May 2013, 35\u201354.. Springer, Athens."},{"key":"76_CR22","first-page":"427","volume-title":"Proceedings of the ACM Conference STOC: 1990","author":"M Naor","year":"1990","unstructured":"Naor, M, Yung M (1990) Public-key cryptosystems provably secure against chosen ciphertext attacks In: Proceedings of the ACM Conference STOC: 1990, 427\u2013437.. ACM DL, Baltimore."},{"key":"76_CR23","first-page":"517","volume-title":"Proceedings of the ACM Conference AsiaCCS: 2013","author":"K Ohara","year":"2013","unstructured":"Ohara, K, Sakai Y, Emura K, Hanaoka G (2013) A group signature scheme with unbounded message-dependent opening In: Proceedings of the ACM Conference AsiaCCS: 2013, 517\u2013522.. ACM DL, Hangzhou."},{"key":"76_CR24","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1561\/0400000074","volume":"10","author":"C Peikert","year":"2016","unstructured":"Peikert, C (2016) A decade of lattice cryptography. Found Trends Theor Comput Sci 10:283\u2013424.","journal-title":"Found Trends Theor Comput Sci"},{"key":"76_CR25","first-page":"145","volume-title":"Proceedings of Conference TCC: 4-7 March 2006","author":"C Peikert","year":"2006","unstructured":"Peikert, C, Rosen A (2006) Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi S Rabin T (eds)Proceedings of Conference TCC: 4-7 March 2006, 145\u2013166.. Springer, New York."},{"key":"76_CR26","first-page":"478","volume-title":"Proceedings of the ACM Conference STOC: 11-13 June 2007","author":"C Peikert","year":"2007","unstructured":"Peikert, C, Rosen A (2007) Lattices that admit logarithmic worst-case to average-case connection factors In: Proceedings of the ACM Conference STOC: 11-13 June 2007, 478\u2013487.. ACM DL, San Diego."},{"issue":"3","key":"76_CR27","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"1999","unstructured":"Pointcheval, D, Stern J (1999) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361\u2013396.","journal-title":"J Cryptol"},{"key":"76_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM 56:1\u201340.","journal-title":"J ACM"},{"key":"76_CR29","first-page":"270","volume-title":"Proceedings of Conference Pairing: 16-18 May 2012","author":"Y Sakai","year":"2012","unstructured":"Sakai, Y, Emura K, Hanaoka G, Kawai Y, Matsuda T, Omote K (2012) Group signatures with message-dependent opening. In: Abdalla M Lange T (eds)Proceedings of Conference Pairing: 16-18 May 2012, 270\u2013294.. Springer, Cologne."},{"issue":"6","key":"76_CR30","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.556672","volume":"42","author":"J Stern","year":"1996","unstructured":"Stern, J (1996) A new paradigm for public key identification. IEEE Trans Inf Theory 42(6):1757\u20131768.","journal-title":"IEEE Trans Inf Theory"},{"key":"76_CR31","volume-title":"Proceedings of Conference INSCRYPT: 11-14 December 2020","author":"Y Sun","year":"2020","unstructured":"Sun, Y, Liu Y (2020) A lattice-based fully dynamic group signature scheme without nizk In: Proceedings of Conference INSCRYPT: 11-14 December 2020.. Springer, Guangzhou."},{"key":"76_CR32","doi-asserted-by":"publisher","unstructured":"Sun, Y, Liu Y, Wu B (2019) An efficient full dynamic group signature scheme over ring. Cybersecurity 2(21). https:\/\/doi.org\/10.1186\/s42400-019-0037-8.","DOI":"10.1186\/s42400-019-0037-8"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-021-00076-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-021-00076-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-021-00076-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T15:19:08Z","timestamp":1620055148000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-021-00076-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["76"],"URL":"https:\/\/doi.org\/10.1186\/s42400-021-00076-8","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,3]]},"assertion":[{"value":"26 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"15"}}