{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:10:54Z","timestamp":1776924654154,"version":"3.51.2"},"reference-count":59,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Major Program of Guangdong Basic and Applied Research","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}]},{"name":"Major Program of Guangdong Basic and Applied Research","award":["62272174"],"award-info":[{"award-number":["62272174"]}]},{"name":"Major Program of Guangdong Basic and Applied Research","award":["61872152"],"award-info":[{"award-number":["61872152"]}]},{"name":"Major Program of Guangdong Basic and Applied Research","award":["201902010081"],"award-info":[{"award-number":["201902010081"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272174"],"award-info":[{"award-number":["62272174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872152"],"award-info":[{"award-number":["61872152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["201902010081"],"award-info":[{"award-number":["201902010081"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Program of Guang-zhou","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}]},{"name":"Science and Technology Program of Guang-zhou","award":["62272174"],"award-info":[{"award-number":["62272174"]}]},{"name":"Science and Technology Program of Guang-zhou","award":["61872152"],"award-info":[{"award-number":["61872152"]}]},{"name":"Science and Technology Program of Guang-zhou","award":["201902010081"],"award-info":[{"award-number":["201902010081"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without revealing the definite signer identify, but this also leads to the abuse of anonymity by malicious signers, which can be prevented by traceable ring signatures (TRS). Up until that point, traceable ring signatures have been secure based on the difficult problem of number-theoretic (discrete logarithms or RSA), but since the advent of quantum computers, traditional traceable ring signatures may no longer be secure. Thus Feng proposed a lattice based TRS, which are resistant to attacks by quantum computers. However, that works did not tackle the certificate management problem. To close this gap, a quantum-resistant certificateless TRS scheme was proposed in the study. To the best of our knowledge, this is the first lattice based certificateless TRS. In detail, a specific TRS scheme was combined with the lattice-based certificateless signature technology to solve the certificate management problem while avoid key escrow problem. Additionally, a better zero-knowledge protocol is used to improve the computational efficiency of the scheme, and by reducing the soundness error of the zero-knowledge protocol, the number of runs of the zero-knowledge protocol is reduced, so that the communication overhead of the scheme is reduced. Under random oracle model, the proposed scheme satisfies tag-linkability, anonymity, exculpability and is secure based on the SIS problem and the DLWE problem. In conclusion, the proposed scheme is more practical and promising in e-voting.<\/jats:p>","DOI":"10.3390\/info14030160","type":"journal-article","created":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T01:43:00Z","timestamp":1677807780000},"page":"160","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Lattice-Based Certificateless Traceable Ring Signature Scheme"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4094-2436","authenticated-orcid":false,"given":"Junbin","family":"Liang","sequence":"first","affiliation":[{"name":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China"}]},{"given":"Jianye","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computing and Information Technology, University of Wollongong, Wollongong 2522, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1385-6564","authenticated-orcid":false,"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China"}]},{"given":"Liantao","family":"Lan","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China"}]},{"given":"Man Ho Allen","family":"Au","sequence":"additional","affiliation":[{"name":"Department of Computing, Hong Kong Polytechnic University, Hong Kong, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,3,2]]},"reference":[{"key":"ref_1","unstructured":"Chow, S.S.M., Liu, J.K., and Wong, D.S. (2008, January 10\u201313). Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, The Internet Society, San Diego, CA, USA."},{"key":"ref_2","first-page":"287","article-title":"Ring signature scheme based on lattice and its application on anonymous electronic voting","volume":"16","author":"Zhou","year":"2022","journal-title":"Ksii Trans. Internet Inf. Syst. (Tiis)"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Tsang, P.P., and Wei, V.K. (2005, January 11\u201314). Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. Proceedings of the Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore.","DOI":"10.1007\/978-3-540-31979-5_5"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"5566430:1","DOI":"10.1155\/2021\/5566430","article-title":"Multiauthority Traceable Ring Signature Scheme for Smart Grid Based on Blockchain","volume":"2021","author":"Tang","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"206581","DOI":"10.1109\/ACCESS.2020.3038042","article-title":"Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice","volume":"8","author":"Han","year":"2020","journal-title":"IEEE Access"},{"key":"ref_6","first-page":"762","article-title":"Traceable Certificateless Ring Signature Scheme for no Full Anonymous Applications","volume":"20","author":"Gu","year":"2018","journal-title":"Int. J. Netw. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_8","unstructured":"Shamir, A. (1984, January 19\u201322). Identity-Based Cryptosystems and Signature Schemes. Proceedings of the Advances in Cryptology, Proceedings of CRYPTO \u201984, Santa Barbara, CA, USA."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., and Paterson, K.G. (December, January 30). Certificateless Public Key Cryptography. Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1109\/TVLSI.2021.3077885","article-title":"Cryptographic Accelerators for Digital Signature Based on Ed25519","volume":"29","author":"Azarderakhsh","year":"2021","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_11","unstructured":"Shor, P.W. (1994, January 20\u201322). Algorithms for Quantum Computation: Discrete Logarithms and Factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, Santa Fe, NM, USA."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1109\/TVLSI.2022.3152011","article-title":"A High-Performance SIKE Hardware Accelerator","volume":"30","author":"Ni","year":"2022","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3719","DOI":"10.1109\/TCSI.2021.3094889","article-title":"High-Speed FPGA Implementation of SIKE Based on an Ultra-Low-Latency Modular Multiplier","volume":"68","author":"Tian","year":"2021","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1109\/TVLSI.2022.3156479","article-title":"Efficient Error Detection Architectures for Postquantum Signature Falcon\u2019s Sampler and KEM SABER","volume":"30","author":"Sarker","year":"2022","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_15","unstructured":"Berzati, A., Viera, A.C., Chartouni, M., Madec, S., Vergnaud, D., and Vigilant, D. (2023, February 20). A Practical Template Attack on CRYSTALS-Dilithium. Cryptology ePrint Archive, Paper 2023\/050. Available online: https:\/\/eprint.iacr.org\/2023\/050."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ajtai, M. (1996, January 22\u201324). Generating Hard Instances of Lattice Problems (Extended Abstract). Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, PA, USA.","DOI":"10.1145\/237814.237838"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., and Tauman, Y. (2001, January 9\u201313). How to Leak a Secret. Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Zhang, F., and Kim, K. (2002, January 1\u20135). ID-Based Blind Signature and Ring Signature from Pairings. Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand.","DOI":"10.1007\/3-540-36178-2_33"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Kiayias, A., Nicolosi, A., and Shoup, V. (2004, January 2\u20136). Anonymous Identification in Ad Hoc Groups. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_36"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Herranz, J., and S\u00e1ez, G. (2004, January 27\u201329). New Identity-Based Ring Signature Schemes. Proceedings of the Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain.","DOI":"10.1007\/978-3-540-30191-2_3"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Chan, T.K., Fung, K., Liu, J.K., and Wei, V.K. (2004, January 6). Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. Proceedings of the Security in Ad-Hoc and Sensor Networks, First European Workshop, ESAS 2004, Berlin\/Heidelberg, Germany.","DOI":"10.1007\/978-3-540-30496-8_8"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Yiu, S., and Hui, L.C.K. (2005, January 7\u201310). Efficient Identity Based Ring Signature. Proceedings of the Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA.","DOI":"10.1007\/11496137_34"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1504\/IJSN.2006.011781","article-title":"Convertible identity-based anonymous designated ring signatures","volume":"1","author":"Chen","year":"2006","journal-title":"Int. J. Secur. Netw."},{"key":"ref_24","unstructured":"Liu, J.K., Wei, V.K., and Wong, D.S. (2004, January 13\u201315). Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). Proceedings of the Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1142\/S0129054106004480","article-title":"Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature","volume":"17","author":"Liu","year":"2006","journal-title":"Int. J. Found. Comput. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s00145-007-9011-9","article-title":"Ring Signatures: Stronger Definitions, and Constructions without Random Oracles","volume":"22","author":"Bender","year":"2009","journal-title":"J. Cryptol."},{"key":"ref_27","unstructured":"Au, M.H., Liu, J.K., Susilo, W., and Yuen, T.H. (2007, January 7\u20139). Certificate Based (Linkable) Ring Signature. Proceedings of the Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1093\/comjnl\/bxs115","article-title":"Efficient Linkable and\/or Threshold Ring Signature Without Random Oracles","volume":"56","author":"Yuen","year":"2013","journal-title":"Comput. J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"153969","DOI":"10.1109\/ACCESS.2019.2948972","article-title":"Identity-Based Linkable Ring Signature Scheme","volume":"7","author":"Deng","year":"2019","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"54641","DOI":"10.1109\/ACCESS.2020.2981360","article-title":"Certificateless Linkable Ring Signature Scheme","volume":"8","author":"Deng","year":"2020","journal-title":"IEEE Access"},{"key":"ref_31","unstructured":"Fujisaki, E., and Suzuki, K. (2007, January 16\u201320). Traceable Ring Signature. Proceedings of the Public Key Cryptography\u2014PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1587\/transfun.E95.A.151","article-title":"Sub-Linear Size Traceable Ring Signatures without Random Oracles","volume":"95-A","author":"Fujisaki","year":"2012","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.tcs.2012.10.031","article-title":"Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction","volume":"469","author":"Au","year":"2013","journal-title":"Theor. Comput. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bultel, X., and Lafourcade, P. (September, January 31). k-Times Full Traceable Ring Signature. Proceedings of the 11th International Conference on Availability, Reliability and Security, ARES 2016 IEEE Computer Society, Salzburg, Austria.","DOI":"10.1109\/ARES.2016.37"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"207","DOI":"10.3934\/amc.2020016","article-title":"Efficient traceable ring signature scheme without pairings","volume":"14","author":"Gu","year":"2020","journal-title":"Adv. Math. Commun."},{"key":"ref_36","first-page":"158","article-title":"Traceable Identity-Based Ring Signature for Protecting Mobile IoT Devices","volume":"Volume 1454","author":"Peng","year":"2021","journal-title":"Proceedings of the Data Mining and Big Data\u20146th International Conference, DMBD 2021"},{"key":"ref_37","first-page":"86","article-title":"A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model","volume":"2010","author":"Brakerski","year":"2010","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_38","first-page":"712","article-title":"Efficient lattice-based ring signature scheme","volume":"35","author":"Tian","year":"2012","journal-title":"Jisuanji Xuebao (Chin. J. Comput.)"},{"key":"ref_39","unstructured":"Lyubashevsky, V. (2012, January 15\u201319). Lattice Signatures without Trapdoors. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2012\u201431st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Libert, B., Ling, S., Nguyen, K., and Wang, H. (2016, January 8\u201312). Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2016\u201435th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria.","DOI":"10.1007\/978-3-662-49896-5_1"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1504\/IJHPCN.2018.093236","article-title":"Lattice-based ring signature scheme under the random oracle model","volume":"11","author":"Wang","year":"2018","journal-title":"Int. J. High Perform. Comput. Netw."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Lu, X., Au, M.H., and Zhang, Z. (2019, January 5\u20137). Raptor: A Practical Lattice-Based (Linkable) Ring Signature. Proceedings of the Applied Cryptography and Network Security\u201417th International Conference, ACNS 2019, Bogota, Colombia.","DOI":"10.1007\/978-3-030-21568-2_6"},{"key":"ref_43","unstructured":"Melchor, C.A., Bettaieb, S., Boyen, X., Fousse, L., and Gaborit, P. (2013, January 22\u201324). Adapting Lyubashevsky\u2019s Signature Schemes to the Ring Signature Setting. Proceedings of the Progress in Cryptology\u2014AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt."},{"key":"ref_44","first-page":"781","article-title":"Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern\u2019s Protocols and Weak PRF with Efficient Protocols from LWR","volume":"2017","author":"Yang","year":"2017","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_45","unstructured":"Torres, W.A.A., Steinfeld, R., Sakzad, A., Liu, J.K., Kuchta, V., Bhattacharjee, N., Au, M.H., and Cheng, J. (2018, January 11\u201313). Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). Proceedings of the Information Security and Privacy\u201423rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Baum, C., Lin, H., and Oechsner, S. (2018, January 29\u201331). Towards Practical Lattice-Based One-Time Linkable Ring Signatures. Proceedings of the Information and Communications Security\u201420th International Conference, ICICS 2018, Lille, France.","DOI":"10.1007\/978-3-030-01950-1_18"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"84739","DOI":"10.1109\/ACCESS.2021.3087808","article-title":"Identity-Based Linkable Ring Signatures From Lattices","volume":"9","author":"Le","year":"2021","journal-title":"IEEE Access"},{"key":"ref_48","first-page":"101","article-title":"Lattice-Based Linkable Ring Signature in the Standard Model","volume":"9","author":"Hu","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_49","first-page":"8431874","article-title":"Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity","volume":"2022","author":"Ye","year":"2022","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1007\/s10623-021-00863-x","article-title":"Traceable ring signatures: General framework and post-quantum security","volume":"89","author":"Feng","year":"2021","journal-title":"Des. Codes Cryptogr."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Zhang, M., and Chen, X. (2021, January 19\u201323). A Post-quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy. Proceedings of the Artificial Intelligence and Security\u20147th International Conference, ICAIS 2021, Dublin, Ireland.","DOI":"10.1007\/978-3-030-78612-0_22"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"e7385","DOI":"10.1002\/cpe.7385","article-title":"A certificateless ring signature scheme based on lattice","volume":"34","author":"Dong","year":"2022","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Yang, R., Au, M.H., Zhang, Z., Xu, Q., Yu, Z., and Whyte, W. (2019, January 18\u201322). Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. Proceedings of the Advances in Cryptology\u2014CRYPTO 2019\u201439th Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-030-26948-7_6"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Regev, O. (2005, January 22\u201324). On lattices, learning with errors, random linear codes, and cryptography. Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA.","DOI":"10.1145\/1060590.1060603"},{"key":"ref_55","unstructured":"Banerjee, A., Peikert, C., and Rosen, A. (2012, January 15\u201319). Pseudorandom Functions and Lattices. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2012\u201431st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Micciancio, D., and Peikert, C. (2012, January 15\u201319). Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2012\u201431st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK.","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Holmgren, J., and Lombardi, A. (2018, January 7\u20139). Cryptographic Hashing from Strong One-Way Functions (Or: One-Way Product Functions and Their Applications). Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France.","DOI":"10.1109\/FOCS.2018.00085"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Libert, B., Ling, S., Nguyen, K., and Wang, H. (2017, January 3\u20137). Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash. Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2017\u201423rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China.","DOI":"10.1007\/978-3-319-70700-6_11"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Ling, S., Nguyen, K., Stehl\u00e9, D., and Wang, H. (March, January 26). Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications. Proceedings of the Public-Key Cryptography\u2014PKC 2013\u201416th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan.","DOI":"10.1007\/978-3-642-36362-7_8"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/3\/160\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:46:30Z","timestamp":1760121990000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/14\/3\/160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,2]]},"references-count":59,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["info14030160"],"URL":"https:\/\/doi.org\/10.3390\/info14030160","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,2]]}}}