{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T04:21:00Z","timestamp":1775794860378,"version":"3.50.1"},"reference-count":47,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.3934\/amc.2024058","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T12:06:31Z","timestamp":1735905991000},"page":"1360-1381","source":"Crossref","is-referenced-by-count":2,"title":["A new path to code-based signatures via identification schemes with restricted errors"],"prefix":"10.3934","volume":"19","author":[{"given":"Marco","family":"Baldi","sequence":"first","affiliation":[]},{"given":"Massimo","family":"Battaglioni","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria dell'Informazione, Universit\u00e0 Politecnica delle Marche, Italy"}]},{"given":"Franco","family":"Chiaraluce","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria dell'Informazione, Universit\u00e0 Politecnica delle Marche, Italy"}]},{"given":"Anna-Lena","family":"Horlemann","sequence":"additional","affiliation":[{"name":"School and Institute of Computer Science, University of St. Gallen, Switzerland"}]},{"given":"Edoardo","family":"Persichetti","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, Florida Atlantic University, USA"}]},{"given":"Paolo","family":"Santini","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria dell'Informazione, Universit\u00e0 Politecnica delle Marche, Italy"}]},{"given":"Violetta","family":"Weger","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Technical University of Munich, Germany"}]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2024058-1"},{"key":"key-10.3934\/amc.2024058-2","doi-asserted-by":"publisher","DOI":"10.1109\/12.280797"},{"key":"key-10.3934\/amc.2024058-3","unstructured":"<p>M. Baldi, A. Barenghi, S. Bitzer, P. Karl, F. Manganiello, A. Pavoni, G. Pelosi, P. Santini, J. Schupp, F. Slaughter, A. Wachter-Zeh and V. Weger, CROSS: Codes and restricted objects signature scheme, Submission to <i>the NIST Post-Quantum Standardization Project<\/i>, 2023.<\/p>"},{"key":"key-10.3934\/amc.2024058-4","doi-asserted-by":"crossref","unstructured":"<p>M. Baldi, S. Bitzer, A. Pavoni, P. Santini, A. Wachter-Zeh and V. Weger, Zero knowledge protocols and signatures from the restricted syndrome decoding problem, <i>Public-Key Cryptography-PKC 2024. Part II<\/i>, Lecture Notes in Comput. Sci., Springer, Cham, <b>14602<\/b> (2024), 243-274.<\/p>","DOI":"10.1007\/978-3-031-57722-2_8"},{"key":"key-10.3934\/amc.2024058-5"},{"key":"key-10.3934\/amc.2024058-6"},{"key":"key-10.3934\/amc.2024058-7"},{"key":"key-10.3934\/amc.2024058-8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254423"},{"key":"key-10.3934\/amc.2024058-9","doi-asserted-by":"crossref","unstructured":"<p>A. Becker, A. Joux, A. May and A. Meurer, Decoding random binary linear codes in $2^{n\/20}$: How 1+1 = 0 improves information set decoding, <i>Advances in Cryptology-EUROCRYPT 2012<\/i>, LNCS, Springer, Berlin, Heidelberg, <b>7237<\/b> (2012), 520-536.<\/p>","DOI":"10.1007\/978-3-642-29011-4_31"},{"key":"key-10.3934\/amc.2024058-10","unstructured":"<p>E. Berlekamp, <i>Algebraic Coding Theory<\/i>, World Scientific, Singapore, 1968.<\/p>"},{"key":"key-10.3934\/amc.2024058-11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"key-10.3934\/amc.2024058-12"},{"key":"key-10.3934\/amc.2024058-13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2040971"},{"key":"key-10.3934\/amc.2024058-14","doi-asserted-by":"crossref","unstructured":"<p>P.-L. Cayrel, P. V\u00e9ron and S. M. E. Y. Alaoui, A zero-knowledge identification scheme based on the $q$-ary syndrome decoding problem, <i>Selected Areas in Cryptography<\/i>, Springer, Berlin, Heidelberg, <b>6544<\/b> (2011), 171-186.<\/p>","DOI":"10.1007\/978-3-642-19574-7_12"},{"key":"key-10.3934\/amc.2024058-15"},{"key":"key-10.3934\/amc.2024058-16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2039065"},{"key":"key-10.3934\/amc.2024058-17","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1963.tb00955.x"},{"key":"key-10.3934\/amc.2024058-18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1971.1090719"},{"key":"key-10.3934\/amc.2024058-19","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5010011"},{"key":"key-10.3934\/amc.2024058-20","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1960.tb03959.x"},{"key":"key-10.3934\/amc.2024058-21","doi-asserted-by":"publisher","DOI":"10.1109\/18.212304"},{"key":"key-10.3934\/amc.2024058-22","unstructured":"<p>V. Guruswami, <i>Introduction to Coding Theory<\/i>, Lecture Notes, 2010.<\/p>"},{"key":"key-10.3934\/amc.2024058-23","doi-asserted-by":"publisher","DOI":"10.1109\/18.272484"},{"key":"key-10.3934\/amc.2024058-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2005.03.001"},{"key":"key-10.3934\/amc.2024058-25"},{"key":"key-10.3934\/amc.2024058-26","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.03.060468"},{"key":"key-10.3934\/amc.2024058-27","doi-asserted-by":"publisher","DOI":"10.1109\/18.651073"},{"key":"key-10.3934\/amc.2024058-28","doi-asserted-by":"crossref","unstructured":"<p>P. J. Lee and E. F. Brickell, An observation on the security of McEliece's public-key cryptosystem, <i>Workshop on the Theory and Application of Cryptographic Techniques<\/i>, Springer, <b>330<\/b> (1988), 275-280.<\/p>","DOI":"10.1007\/3-540-45961-8_25"},{"key":"key-10.3934\/amc.2024058-29"},{"key":"key-10.3934\/amc.2024058-30","doi-asserted-by":"publisher","DOI":"10.1109\/18.21270"},{"key":"key-10.3934\/amc.2024058-31","unstructured":"<p>F. J. MacWilliams and N. J. A. Sloane, <i>The Theory of Error-Correcting Codes<\/i>, Elsevier, New York, USA, 1977.<\/p>"},{"key":"key-10.3934\/amc.2024058-32","doi-asserted-by":"crossref","unstructured":"<p>F. Manganiello and F. Slaughter, Generic error SDP and generic error CVE, <i>Code-Based Cryptography. CBCrypto 2022<\/i>, Lecture Notes in Computer Science, Springer, Cham, <b>14311<\/b> (2023), 125-143.<\/p>","DOI":"10.1007\/978-3-031-46495-9_7"},{"key":"key-10.3934\/amc.2024058-33","doi-asserted-by":"crossref","unstructured":"<p>A. May, A. Meurer and E. Thomae, Decoding random linear codes in $\\mathcal{O}(2^{0.054 n})$, <i>International Conference on the Theory and Application of Cryptology and Information Security<\/i>, Springer, <b>7073<\/b> (2011), 107-124.<\/p>","DOI":"10.1007\/978-3-642-25385-0_6"},{"key":"key-10.3934\/amc.2024058-34"},{"key":"key-10.3934\/amc.2024058-35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057777"},{"key":"key-10.3934\/amc.2024058-36","doi-asserted-by":"crossref","unstructured":"<p>R. M. Roth, <i>Introduction to Coding Theory<\/i>, IET Communications, 2006.<\/p>","DOI":"10.1017\/CBO9780511808968"},{"key":"key-10.3934\/amc.2024058-37"},{"key":"key-10.3934\/amc.2024058-38","doi-asserted-by":"publisher","DOI":"10.1007\/BF01581144"},{"key":"key-10.3934\/amc.2024058-39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2661747"},{"key":"key-10.3934\/amc.2024058-40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1964.1053661"},{"key":"key-10.3934\/amc.2024058-41","doi-asserted-by":"crossref","unstructured":"<p>J. Stern, A method for finding codewords of small weight, <i>International Colloquium on Coding Theory and Applications<\/i>, Springer, <b>388<\/b> (1988), 106-113.<\/p>","DOI":"10.1007\/BFb0019850"},{"key":"key-10.3934\/amc.2024058-42","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3206395"},{"key":"key-10.3934\/amc.2024058-43"},{"key":"key-10.3934\/amc.2024058-44","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5040033"},{"key":"key-10.3934\/amc.2024058-45","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1054954"},{"key":"key-10.3934\/amc.2024058-46","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3059001"},{"key":"key-10.3934\/amc.2024058-47","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2582759"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"deposited":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T09:36:54Z","timestamp":1745228214000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/\/article\/doi\/10.3934\/amc.2024058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.3934\/amc.2024058","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}