{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T09:46:43Z","timestamp":1753868803668,"version":"3.41.2"},"reference-count":51,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T00:00:00Z","timestamp":1517270400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2018,4]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are helpful where bandwidth is one of the critical concern. This primitive is especially used for signing short messages in applications such as time stamping, certified email services, and identity\u2010based cryptosystems. In this paper, to have quantum\u2010attack\u2010resistant short signatures, the first signature scheme with partially message recovery based on coding theory is presented. Next, it is shown that the proposal is secure under Goppa Parametrized Bounded Decoding and the Goppa Code Distinguishing assumptions in the random oracle model. Relying on the partially message recovery property, the proposal is shorter than Dallot signature scheme, the only provably secure and practical code\u2010based signature scheme, while it preserves Dallot signature efficiency. We should highlight that our scheme can be used as a building block to construct short code\u2010based signature schemes with special properties. To show this, we present a provably secure short designated verifier signature scheme, a nontransferable form of short signatures, which is used in electronic voting and deniable authentication protocols.<\/jats:p>","DOI":"10.1002\/dac.3519","type":"journal-article","created":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T03:26:36Z","timestamp":1517369196000},"source":"Crossref","is-referenced-by-count":0,"title":["A provably secure code\u2010based short signature scheme and its nontransferable variant"],"prefix":"10.1002","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8333-8394","authenticated-orcid":false,"given":"Maryam","family":"Rajabzadeh Asaar","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Science and Research Branch Islamic Azad University Tehran Iran"}]},{"given":"Mahmoud","family":"Salmasizadeh","sequence":"additional","affiliation":[{"name":"Electronics Research Institute (Center) Sharif University of Technology Tehran Iran"}]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering Sharif University of Technology Tehran Iran"}]}],"member":"311","published-online":{"date-parts":[[2018,1,30]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/SFCS.1994.365700","volume-title":"Proc. of the 35th Annual Symposium on Foundations of Computer Science","author":"Shor PW","year":"1994"},{"issue":"2","key":"e_1_2_7_3_1","first-page":"114","article-title":"A public\u2010key cryptosystem based on algebraic coding theory","volume":"42","author":"McEliece RJ","year":"1978","journal-title":"DSN Progress Report"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/11818175_8","volume-title":"Proc. of 26th Annual Int. Cryptology Conf. on Advances in Cryptology\u2010CRYPTO 2006","author":"Regev O","year":"2006"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7"},{"issue":"2","key":"e_1_2_7_6_1","first-page":"159","article-title":"Knapsack\u2010type cryptosystems and algebraic coding theory","volume":"15","author":"Niederreiter H","year":"1986","journal-title":"Prob Control Inf Theory"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.272496"},{"key":"e_1_2_7_8_1","first-page":"157","volume-title":"Proc. of the 7th int. conf. on the theory and application of cryptology and information security\u2010advances in cryptology\u2010asiacrypt 2001","author":"Courtois NT","year":"2001"},{"key":"e_1_2_7_9_1","first-page":"62","volume-title":"Proc. of the 1st Acm Conf. on Computer and Communications Security (CCS 1993)","author":"Bellare M","year":"1993"},{"key":"e_1_2_7_10_1","first-page":"65","volume-title":"Proc. of the 2nd Western European Workshop on Research in Cryptology\u2010WEWORC 2007","author":"Dallot L","year":"2008"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"e_1_2_7_12_1","unstructured":"SendrierN.Cryptosystmes cl publique bass sur les codes correcteurs erreurs. In: Habilitation Diriger Les Recherches Universit Pierre et Marie Curie;2002;Paris France (in French)."},{"key":"e_1_2_7_13_1","first-page":"69","volume-title":"Proc. of the Int. Workshop on Coding and Cryptology (WCC 2007)","author":"Cayrel PL","year":"2007"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.09.016"},{"issue":"2","key":"e_1_2_7_15_1","first-page":"154","article-title":"Code\u2010based ring signature scheme","volume":"5","author":"Zheng D","year":"2007","journal-title":"Int J Network Secur"},{"key":"e_1_2_7_16_1","first-page":"34","volume-title":"Proc. of the 5th Int. Conf. on Information and Communications Security\u2010 ICICS 2003","author":"Wong DS","year":"2003"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2145950"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/978-3-642-10868-6_13","volume-title":"Proc. of the 12th Int. Conf. on the Cryptography and Coding","author":"Dallot L","year":"2009"},{"key":"e_1_2_7_19_1","unstructured":"OverbeckR.A step towards QC blind signatures. IACR Cryptology ePrint Archive;2009."},{"key":"e_1_2_7_20_1","first-page":"99","volume-title":"Proc. of the 16th Int. Conf. on Information Security and Cryptology\u2010ICISC 2013","author":"Mathew KP","year":"2013"},{"key":"e_1_2_7_21_1","first-page":"99","volume-title":"Proc. of the 14th IMA Int. Conf. on Cryptography and Coding\u2010IMACC 2013","author":"Aguilar\u2010Melchor C","year":"2013"},{"issue":"7","key":"e_1_2_7_22_1","doi-asserted-by":"crossref","DOI":"10.1002\/dac.3162","article-title":"Provably secure strong designated verifier signature scheme based on coding theory","volume":"30","author":"Shooshtari MK","year":"2016","journal-title":"Int J Commun Syst"},{"key":"e_1_2_7_23_1","first-page":"399","volume-title":"Proc. of the 15th Annual Int. Conf. on Theory and Application of Cryptographic Techniques, Advances in Cryptology Eurocrypt 1996","author":"Bellare M","year":"1996"},{"key":"e_1_2_7_24_1","unstructured":"ISO\/IEC 9796\u20101 information technology security techniques digital signature scheme giving message recovery part 1: Mechanisms using redundancy."},{"key":"e_1_2_7_25_1","unstructured":"ISO\/IEC 9796\u20102:2002 information technology security techniques digital signature scheme giving message recovery Part 2: Integer factorization based mechanisms."},{"key":"e_1_2_7_26_1","unstructured":"ISO\/IEC 9796\u20102:2010 information technology security techniques digital signature scheme giving message recovery part 2: Integer factorization based mechanisms."},{"key":"e_1_2_7_27_1","first-page":"58","volume-title":"Proc. of the 1st Acm Conf. on Computer and Communications Security (CCS 1993)","author":"Nyberg K","year":"1993"},{"key":"e_1_2_7_28_1","first-page":"182","volume-title":"Proc. of Workshop on the Theory and Application of Cryptographic Techniques, Advances in Cryptology \u2010 EUROCRYPT 1994","author":"Nyberg K","year":"1995"},{"issue":"1","key":"e_1_2_7_29_1","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/BF00125076","article-title":"Message recovery for signature schemes based on the discrete logarithm problem","volume":"7","author":"Nyberg K","year":"1996","journal-title":"Des Codes Cryptography"},{"key":"e_1_2_7_30_1","first-page":"1","volume-title":"Proc. of the Int. Conf. on the Theory and Applications of Cryptology and Information Security, Advances in Cryptology ASIACRYPT 1996","author":"Miyaji A","year":"1996"},{"key":"e_1_2_7_31_1","first-page":"378","volume-title":"Proc. of the Int. Conf. on the Theory and Application of Cryptology and Information Security, Advances in Cryptology ASIACRYPT 1999","author":"Abe M","year":"1999"},{"key":"e_1_2_7_32_1","first-page":"143","volume-title":"Proc. of the 15th Int. Conf. on the Theory and Application of Cryptographic Techniques\u2010Advances in Cryptology\u2010EUROCRYPT 1996","author":"Impagliazzo R","year":"1996"},{"key":"e_1_2_7_33_1","first-page":"212","volume-title":"Proc. of 9th Annual Int. Cryptology Conf. on Advances in Cryptology\u2010CRYPTO 1989","author":"van\u00a0Antwerpen H","year":"1989"},{"key":"e_1_2_7_34_1","first-page":"367","volume-title":"Proc. of 1st Int. Conf. on Pairing\u2010Based Cryptography\u2010Pairing 2007","author":"Mu Y","year":"2007"},{"issue":"6","key":"e_1_2_7_35_1","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1016\/j.ins.2008.11.011","article-title":"A non\u2010interactive deniable authentication scheme based on designated verifier proofs","volume":"179","author":"Song Z","year":"2009","journal-title":"Int J Inf Sci"},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2820"},{"key":"e_1_2_7_37_1","doi-asserted-by":"crossref","unstructured":"ChenL JordanS LiuYK MoodyD PeraltaR R.Perlner Smith\u2010ToneD.Report on post\u2010quantum cryptography. Internal Report 8105 \u00a0 National Institute of Standards and Technology;2016.\u00a0https:\/\/doi.org\/10.6028\/NIST.IR.8105.","DOI":"10.6028\/NIST.IR.8105"},{"key":"e_1_2_7_38_1","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/11507840_5","volume-title":"Proc. of the 9th Int. Conf. on Financial Cryptography and Data Security (FC 2005)","author":"Zhang F","year":"2005"},{"key":"e_1_2_7_39_1","first-page":"1","volume-title":"These de doctorat, cole polytechnique","author":"Finiasz M","year":"2004"},{"key":"e_1_2_7_40_1","first-page":"523","volume-title":"Proc. of 9th Int. Conf. on the Theory and Application of Cryptology and Information Security","author":"Wang H","year":"2003"},{"key":"e_1_2_7_41_1","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/3-540-44598-6_14","volume-title":"Proc. of the 20th Annual Int. Cryptology Conf. on Advances in Cryptology\u2010CRYPTO 2000","author":"Coron J","year":"2000"},{"key":"e_1_2_7_42_1","first-page":"514","volume-title":"Proc. of the 7th Int. Conf. on the Theory and Application of Cryptology and Information Security, Advances in Cryptology\u2010ASIACRYPT 2001","author":"Boneh D","year":"2001"},{"key":"e_1_2_7_43_1","first-page":"277","volume-title":"Proc. of 7th Annual Int. Cryptology Workshop on Theory and Practice in Public Key Cryptography\u2010PKC 2004","author":"Zhang F","year":"2004"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/357980.358017"},{"key":"e_1_2_7_45_1","unstructured":"Proposed federal information processing standard for digital signature standard (dss) federal register."},{"key":"e_1_2_7_46_1","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/978-3-319-31517-1_3","volume-title":"Proc. of the 8th Int. Conf. on Cryptology in Africa, Progress in Cryptology\u2010AFRICACRYPT 2016","author":"Akleylek S","year":"2016"},{"key":"e_1_2_7_47_1","first-page":"84","volume-title":"Proc. of the 3rd Int. Conf. on on Cryptology and Information Security, Progress in Cryptology\u2010LATINCRYPT 2014)","author":"Dagdelen O","year":"2015"},{"key":"e_1_2_7_48_1","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1007\/978-3-642-33027-8_31","volume-title":"Proc. of 14th Int. Workshop on Cryptographic Hardware and Embedded Systems\u2010CHES 2012","author":"Gneysu T","year":"2012"},{"key":"e_1_2_7_49_1","first-page":"67","volume-title":"Proc. of the 5th Int. Workshop on Post\u2010Quantum Cryptography, Progress in Cryptology\u2010PQCrypto 2013)","author":"Guneysu T","year":"2013"},{"key":"e_1_2_7_50_1","first-page":"88","volume-title":"Proc. of the 15th Int. Conf. on the Theory and Application of Cryptology and Information Security\u2010Advances in Cryptology\u2010ASIACRYPT 2009","author":"Finiasz M","year":"2009"},{"key":"e_1_2_7_51_1","first-page":"122","volume-title":"Proc. of the Cryptographers' Track at the RSA Conf. (CT\u2010RSA 2003), Topics in CryptologyCT\u2010RSA 2003 (acisp 2006)","author":"Hoffstein J","year":"2003"},{"key":"e_1_2_7_52_1","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/978-3-540-78440-1_17","volume-title":"Proc. of the 11th Int. Workshop on Public Key Cryptography (PKC 2008)","author":"Plantard T","year":"2008"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.3519","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.3519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T05:20:23Z","timestamp":1751260823000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.3519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,30]]},"references-count":51,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["10.1002\/dac.3519"],"URL":"https:\/\/doi.org\/10.1002\/dac.3519","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"type":"print","value":"1074-5351"},{"type":"electronic","value":"1099-1131"}],"subject":[],"published":{"date-parts":[[2018,1,30]]},"article-number":"e3519"}}