{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:12:31Z","timestamp":1777014751783,"version":"3.51.4"},"reference-count":37,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.3934\/amc.2024055","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T07:00:17Z","timestamp":1734591617000},"page":"1301-1319","source":"Crossref","is-referenced-by-count":2,"title":["Linkable ring signature scheme based on multivariate polynomial over finite field"],"prefix":"10.3934","volume":"19","author":[{"given":"Satyam","family":"Omar","sequence":"first","affiliation":[]},{"given":"Sahadeo","family":"Padhye","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Motilal Nehru National Institute of Technology, Prayagraj 211 004, India"}]},{"given":"Dhananjoy","family":"Dey","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Indian Institute of Information Technology, Lucknow 226 002, India"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2024055-1","doi-asserted-by":"crossref","unstructured":"<p>M. Abdalla, J. H. An, M. Bellare and C. Namprempre, From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security, in <i>EUROCRYPT 2002<\/i>, LNCS, Springer, <b>2332<\/b> (2002), 418-433.<\/p>","DOI":"10.1007\/3-540-46035-7_28"},{"key":"key-10.3934\/amc.2024055-2","doi-asserted-by":"crossref","unstructured":"<p>M. H. Au, S. S. M. Chow, W. Susilo and P. P. Tsang, Short linkable ring signatures revisited, in <i>EuroPKI 2006<\/i>, LNCS, Springer, <b>4043<\/b> (2006), 101-115.<\/p>","DOI":"10.1007\/11774716_9"},{"key":"key-10.3934\/amc.2024055-3","doi-asserted-by":"crossref","unstructured":"<p>D. J. Bernstein, J. Buchmann and E. Dahmen, <i>Post-Quantum Cryptography<\/i>, Springer, 2009.<\/p>","DOI":"10.1007\/978-3-540-88702-7"},{"key":"key-10.3934\/amc.2024055-4","doi-asserted-by":"crossref","unstructured":"<p>P. Branco and P. Mateus, A code-based linkable ring signature scheme, in <i>ProvSec-2018<\/i>, LNCS, Springer, <b>11192<\/b> (2018), 203-219.<\/p>","DOI":"10.1007\/978-3-030-01446-9_12"},{"key":"key-10.3934\/amc.2024055-5","unstructured":"<p>A. Casanova, J. C. Faug\u00e8re, G. Macario, J. Patarin and L. Perret, GeMSS: A great multivariate short signature., <i>UPMC-Paris 6 Sorbonne Universit\u00e9s; INRIA Paris Research Centre, MAMBA Team, F-75012, Paris, France<\/i>, LIP6 - Laboratoire d'Informatique de Paris, Hal-01662158, <b>6<\/b> (2017), 1-4.<\/p>"},{"key":"key-10.3934\/amc.2024055-6","doi-asserted-by":"crossref","unstructured":"<p>M.-S. Chen, A. H\u00fclsing, J. Rijneveld, S. Samardjiska and P. Schwabe, From 5-pass MQ-based identification to MQ-based signatures, in <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security<\/i>, LNCS, Springer, <b>10032<\/b> (2016), 135-165.<\/p>","DOI":"10.1007\/978-3-662-53890-6_5"},{"key":"key-10.3934\/amc.2024055-7","unstructured":"<p>N. T. Courtois, L. Goubin and J. Patarin, SFLASHv3, a fast asymmetric signature scheme, <i>IACR Cryptology ePrint Archive<\/i>, Citeseer, report 2003\/211.<\/p>"},{"key":"key-10.3934\/amc.2024055-8","unstructured":"<p>I. Damgard, <i>On $\\sigma$-Protocols<\/i>, Lecture Notes, University of Aarhus, Department for Computer Science, 2002.<\/p>"},{"key":"key-10.3934\/amc.2024055-9","doi-asserted-by":"crossref","unstructured":"<p>J. Ding and D. Schmidt, Rainbow, a new multivariate polynomial signature scheme, <i>ACNS 2005<\/i>, LNCS, Springer, <b>3531<\/b> (2005), 164-175.<\/p>","DOI":"10.1007\/11496137_12"},{"key":"key-10.3934\/amc.2024055-10","doi-asserted-by":"crossref","unstructured":"<p>D. H. Duong, H. T. N. Tran, W. Susilo and L. V. Luyen, An efficient multivariate threshold ring signature scheme, <i>Computer Standards and Interfaces<\/i>, Elsevier, <b>74<\/b> (2021), 103489.<\/p>","DOI":"10.1016\/j.csi.2020.103489"},{"key":"key-10.3934\/amc.2024055-11","doi-asserted-by":"crossref","unstructured":"<p>A. Fiat and A. Shamir, How To prove yourself: Practical solutions to identification and signature problems, in <i>Advances in Cryptology \u2014 CRYPTO' 86<\/i>, LNCS, Springer, <b>263<\/b> (1987), 186-194.<\/p>","DOI":"10.1007\/3-540-47721-7_12"},{"key":"key-10.3934\/amc.2024055-12","doi-asserted-by":"crossref","unstructured":"<p>M. Finiasz and N. Sendrier, Security bounds for the design of code-based cryptosystems, in <i>ASIACRYPT-2009<\/i>, LNCS, Springer, <b>5912<\/b> (2009), 88-105.<\/p>","DOI":"10.1007\/978-3-642-10366-7_6"},{"key":"key-10.3934\/amc.2024055-13","doi-asserted-by":"crossref","unstructured":"<p>P.-A. Fouque, L. Granboulan and J. Stern, Differential cryptanalysis for multivariate schemes, in <i>Advances in Cryptology \u2013 EUROCRYPT 2005<\/i>, LNCS, Springer, <b>3494<\/b> (2005), 341-353.<\/p>","DOI":"10.1007\/11426639_20"},{"key":"key-10.3934\/amc.2024055-14","unstructured":"<p>M. R. Garey and D. S. Johnson, <i>Computers and Intractability, A Guide to the Theory of NP-Completeness<\/i>, W. H. Freeman and Company, New york, 1979.<\/p>"},{"key":"key-10.3934\/amc.2024055-15","unstructured":"<p>M. Hu and Z. Liu, <i>Lattice-Based Linkable Ring Signature in the Standard Model<\/i>, 2022.<\/p>"},{"key":"key-10.3934\/amc.2024055-16","doi-asserted-by":"crossref","unstructured":"<p>A. Kipnis, J. Patarin and L. Goubin, Unbalanced oil and vinegar schemes, <i>EUROCRYPT 1999<\/i>, LNCS, Springer, <b>1592<\/b> (1999), 206-222. Springer, Berlin, Heidelberg.<\/p>","DOI":"10.1007\/3-540-48910-X_15"},{"key":"key-10.3934\/amc.2024055-17","doi-asserted-by":"crossref","unstructured":"<p>J. K. Liu, M. H. Au, W. Susilo and J. Zhou, Linkable ring signature with unconditional anonymity, <i>IEEE Trans. Knowl. Data Eng<\/i>, IEEE, <b>26<\/b> (2014), 157-165.<\/p>","DOI":"10.1109\/TKDE.2013.17"},{"key":"key-10.3934\/amc.2024055-18","doi-asserted-by":"crossref","unstructured":"<p>J. K. Liu, V. K. Wei and D. S. Wong, Linkable spontaneous anonymous group signature for Ad Hoc groups, <i>ACISP 2004<\/i>, LNCS, Springer, <b>3108<\/b> (2004), 325-335.<\/p>","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"key-10.3934\/amc.2024055-19","doi-asserted-by":"crossref","unstructured":"<p>J. K. Liu and D. S. Wong, Linkable ring signatures: Security models and new schemes (extended abstract), <i>ICCSA 2005<\/i>, LNCS, Springer, <b>3481<\/b> (2005), 614-623.<\/p>","DOI":"10.1007\/11424826_65"},{"key":"key-10.3934\/amc.2024055-20","doi-asserted-by":"crossref","unstructured":"<p>Q. Liu and M. Zhandry, Revisiting post-quantum fiat-shamir, <i>Eprint IACR Archive<\/i>, 2019\/262.<\/p>","DOI":"10.1007\/978-3-030-26951-7_12"},{"key":"key-10.3934\/amc.2024055-21","doi-asserted-by":"crossref","unstructured":"<p>T. Matsumoto and H. Imai, Public quadratic polynomial-tuples for efficient signature-verification and message-encryption, in <i>Advances in Cryptology-EUROCRYPT'88<\/i>, LNCS, Springer, <b>330<\/b> (1988), 419-453.<\/p>","DOI":"10.1007\/3-540-45961-8_39"},{"key":"key-10.3934\/amc.2024055-22","doi-asserted-by":"crossref","unstructured":"<p>M. S. E. Mohamed and A. Petzoldt, RingRainbow\u2013An efficient multivariate ring signature scheme, <i>Progress in Cryptology- AFRICACRYPT 2017<\/i>, LNCS, Springer, <b>10239<\/b> (2017), 3-20.<\/p>","DOI":"10.1007\/978-3-319-57339-7_1"},{"key":"key-10.3934\/amc.2024055-23","doi-asserted-by":"crossref","unstructured":"<p>S. Omar, S. Padhye and D. Dey, Cryptanalysis of multivariate threshold ring signature schemes, <i>Information Processing Letters<\/i>, Elsevier, <b>181<\/b> (2023), 106357.<\/p>","DOI":"10.1016\/j.ipl.2022.106357"},{"key":"key-10.3934\/amc.2024055-24","doi-asserted-by":"crossref","unstructured":"<p>J. Patarin, Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt'88, <i>CRYPTO 1995<\/i>, LNCS, Springer, <b>963<\/b> (1995), 248-261.<\/p>","DOI":"10.1007\/3-540-44750-4_20"},{"key":"key-10.3934\/amc.2024055-25","doi-asserted-by":"crossref","unstructured":"<p>J. Patarin, Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms, <i>International Conference on the Theory and Applications of Cryptographic Techniques<\/i>, LNCS, Springer, <b>1070<\/b> (1996), 33-48.<\/p>","DOI":"10.1007\/3-540-68339-9_4"},{"key":"key-10.3934\/amc.2024055-26","unstructured":"<p>J. Patarin, <i>The Oil and Vinegar Signature Scheme<\/i>, Dagstuhl Workshop on Cryptography September, 1997.<\/p>"},{"key":"key-10.3934\/amc.2024055-27","doi-asserted-by":"crossref","unstructured":"<p>A. Petzoldt, S. Bulygin and J. Buchmann, A multivariate based threshold ring signature scheme, <i>Applicable Algebra in Engineering, Communication and Computing<\/i>, Springer, <b>24<\/b> (2013), 255-275.<\/p>","DOI":"10.1007\/s00200-013-0190-3"},{"key":"key-10.3934\/amc.2024055-28","doi-asserted-by":"crossref","unstructured":"<p>A. Petzoldt, M.-S. Chen, B.-Y. Yang, C. Tao and J. Ding, Design principles for HFEv-based signature schemes, <i>Proceedings of ASIACRYPT 2015 - Part 1<\/i>, LNCS, Springer, <b>9452<\/b> (2015), 311-334.<\/p>","DOI":"10.1007\/978-3-662-48797-6_14"},{"key":"key-10.3934\/amc.2024055-29","doi-asserted-by":"crossref","unstructured":"<p>R. L. Rivest, A. Shamir and Y. Taumann, How to leak a secret, <i>Advances in Cryptology - ASIACRYPT 2001<\/i>, LNCS, Springer, <b>2248<\/b> (2001), 552-565.<\/p>","DOI":"10.1007\/3-540-45682-1_32"},{"key":"key-10.3934\/amc.2024055-30","doi-asserted-by":"crossref","unstructured":"<p>K. Sakumoto, T. Shirai and H. Hiwatari, Public-key identification schemes based on multivariate quadratic polynomials, <i>Advances in Cryptology \u2013 CRYPTO 2011<\/i>, LNCS, Springer, <b>6841<\/b> (2011), 706-723.<\/p>","DOI":"10.1007\/978-3-642-22792-9_40"},{"key":"key-10.3934\/amc.2024055-31","doi-asserted-by":"crossref","unstructured":"<p>P. Shor, Algorithms for quantum computation: discrete logarithms and factoring, <i>35th Annual Symposium on Foundations of Computer Science<\/i>, IEEE, (1994), 124-134.<\/p>","DOI":"10.1109\/SFCS.1994.365700"},{"key":"key-10.3934\/amc.2024055-32","doi-asserted-by":"crossref","unstructured":"<p>S.-F. Sun, M. H. Au, J. K. Liu and T. H. Yuen, Ringct 2.0 a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero, in <i>European Symposium on Research in Computer Security ESORICS-2017<\/i>, LNCS, Springer, <b>10493<\/b> (2017), 456-474.<\/p>","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"key-10.3934\/amc.2024055-33","doi-asserted-by":"crossref","unstructured":"<p>P. P. Tsang and V. K. Wei, Short linkable ring signatures for e-voting, e-cash and attestation, <i>ISPEC 2005<\/i>, LNCS, Springer, <b>3439<\/b> (2005), 48-60.<\/p>","DOI":"10.1007\/978-3-540-31979-5_5"},{"key":"key-10.3934\/amc.2024055-34","doi-asserted-by":"crossref","unstructured":"<p>D. Unruh, Post-quantum security of Fiat-Shamir, <i>ASIACRYPT 2017<\/i>, LNCS, Springer, <b>10624<\/b> (2017), 65-95.<\/p>","DOI":"10.1007\/978-3-319-70694-8_3"},{"key":"key-10.3934\/amc.2024055-35","doi-asserted-by":"crossref","unstructured":"<p>S. Wang, R. Ma, Y. Zhang and X. Wang, Ring signature scheme based on multivariate public key cryptosystems, <i>Computers and Mathematics with Applications<\/i>, Elsevier, <b>62<\/b> (2011), 3973-3979.<\/p>","DOI":"10.1016\/j.camwa.2011.09.052"},{"key":"key-10.3934\/amc.2024055-36","doi-asserted-by":"crossref","unstructured":"<p>K. Yamashita and K. Hara, On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes, <i>Journal of Mathematical Cryptology, Degruyter<\/i>, (2024), 18, Paper No. 20230028, 12 pp.<\/p>","DOI":"10.1515\/jmc-2023-0028"},{"key":"key-10.3934\/amc.2024055-37","doi-asserted-by":"crossref","unstructured":"<p>J. Zhang and Y. Zhao, A new multivariate based threshold ring signature scheme, <i>NSS 2014<\/i>, LNCS, Springer, <b>8792<\/b> (2014), 526-533.<\/p>","DOI":"10.1007\/978-3-319-11698-3_42"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"deposited":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T09:36:40Z","timestamp":1745228200000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2024055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2024055","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}