{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:09Z","timestamp":1740122529248,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T00:00:00Z","timestamp":1642291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T00:00:00Z","timestamp":1642291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100009035","name":"Program on Open Innovation Platform with Enterprises, Research Institute and Academia","doi-asserted-by":"crossref","award":["JPMJOP1612"],"id":[{"id":"10.13039\/501100009035","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003382","name":"Core Research for Evolutional Science and Technology","doi-asserted-by":"publisher","award":["JPMJCR14D6"],"id":[{"id":"10.13039\/501100003382","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003382","name":"Core Research for Evolutional Science and Technology","doi-asserted-by":"crossref","award":["JPMJCR19F6"],"id":[{"id":"10.13039\/501100003382","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"crossref","award":["16H01705"],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["17H01695"],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"crossref","award":["19H01109"],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["20J14338"],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10623-021-00975-4","type":"journal-article","created":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T00:03:06Z","timestamp":1642291386000},"page":"277-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generic transformation from broadcast encryption to round-optimal deniable ring authentication"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3598-0988","authenticated-orcid":false,"given":"Keisuke","family":"Hara","sequence":"first","affiliation":[]},{"given":"Takahiro","family":"Matsuda","sequence":"additional","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]},{"given":"Keisuke","family":"Tanaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,16]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal S., Yamada S.: Optimal broadcast encryption from pairings and LWE. In: Rijmen V., Ishai Y. (eds.) EUROCRYPT 2020, pp. 13\u201343. Part I, LNCS. Springer, Heidelberg (2020).","key":"975_CR1","DOI":"10.1007\/978-3-030-45721-1_2"},{"doi-asserted-by":"crossref","unstructured":"Agrawal S., Wichs D., Yamada S.: Optimal broadcast encryption from LWE and pairings in the standard model. In: TCC 2020, pp. 149\u2013178. Part I, LNCS. Springer, Heidelberg (2020).","key":"975_CR2","DOI":"10.1007\/978-3-030-64375-1_6"},{"unstructured":"Alekhnovich M.: More on average case vs approximation complexity. In: 44th FOCS, pp. 298\u2013307. IEEE Computer Society Press (2003).","key":"975_CR3"},{"doi-asserted-by":"crossref","unstructured":"Baltico C.E., Zaira C., Dario F., Dario G., Gay R.: Practical functional encryption for quadratic functions with applications to predicate encryption. In: Katz J., Shacham H. (eds.) CRYPTO 2017, pp. 67\u201398. Part I, vol. 10401 of LNCS. Springer, Heidelberg (2017).","key":"975_CR4","DOI":"10.1007\/978-3-319-63688-7_3"},{"doi-asserted-by":"crossref","unstructured":"Bellare M., Palacio A.: Towards plaintext-aware public-key encryption without random oracles. In: Pil\u00a0J.L. (ed.) ASIACRYPT\u00a02004, vol. 3329 of LNCS, pp. 48\u201362. Springer, Heidelberg (2004).","key":"975_CR5","DOI":"10.1007\/978-3-540-30539-2_4"},{"doi-asserted-by":"crossref","unstructured":"Bellare M., Rogaway P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Denning D.E., Pyle R., Ganesan R., Sandhu R.S., Ashby V. (eds.) ACM CCS 93, pp. 62\u201373. ACM Press, (1993).","key":"975_CR6","DOI":"10.1145\/168588.168596"},{"doi-asserted-by":"crossref","unstructured":"Bellare M., Desai A., Pointcheval D., Rogaway P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk H. (ed.) CRYPTO\u201998, vol. 1462, pp. 26\u201345. LNCS. Springer, Heidelberg (1998).","key":"975_CR7","DOI":"10.1007\/BFb0055718"},{"issue":"1","key":"975_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s00145-013-9167-4","volume":"28","author":"M Bellare","year":"2015","unstructured":"Bellare M., Hofheinz D., Kiltz E.: Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? J. Cryptol. 28(1), 29\u201348 (2015).","journal-title":"J. Cryptol."},{"doi-asserted-by":"crossref","unstructured":"Beullens W., Wee H.: Obfuscating simple functionalities from knowledge assumptions. In: PKC 2019, pp. 254\u2013283. Part II, LNCS. Springer, Heidelberg (2019).","key":"975_CR9","DOI":"10.1007\/978-3-030-17259-6_9"},{"doi-asserted-by":"crossref","unstructured":"Blum M., Feldman P., Micali S.: Non-interactive zero-knowledge and its applications (extended abstract). In: 20th ACM STOC, pp. 103\u2013112. ACM Press (1988).","key":"975_CR10","DOI":"10.1145\/62212.62222"},{"doi-asserted-by":"crossref","unstructured":"Boneh D., Gentry C., Waters B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V. (ed.) CRYPTO 2005, vol. 3621, pp. 258\u2013275. LNCS. Springer, Heidelberg (2005).","key":"975_CR11","DOI":"10.1007\/11535218_16"},{"doi-asserted-by":"crossref","unstructured":"Chen J., Gay R., Wee H.: Improved dual system ABE in prime-order groups via predicate encodings. In: Oswald E., Fischlin M. (eds.) In: EUROCRYPT 2015, pp. 595\u2013624. Part II, vol. 9057 of LNCS. Springer, Heidelberg (2015).","key":"975_CR12","DOI":"10.1007\/978-3-662-46803-6_20"},{"doi-asserted-by":"crossref","unstructured":"Cramer R., Shoup V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In Knudsen L.R., (eds.) EUROCRYPT\u00a02002, vol. 2332 of LNCS, pp. 45\u201364. Springer, Heidelberg (2002).","key":"975_CR13","DOI":"10.1007\/3-540-46035-7_4"},{"doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I.: Towards practical public key systems secure against chosen ciphertext attacks. In: Feigenbaum J. (ed.) CRYPTO\u201991, vol. 576, pp. 445\u2013456. LNCS. Springer, Heidelberg (1992).","key":"975_CR14","DOI":"10.1007\/3-540-46766-1_36"},{"doi-asserted-by":"crossref","unstructured":"Di Raimondo M., Gennaro R.: New approaches for deniable authentication. In: Vijayalakshmi A., Catherine M., Ari J. (eds.) In: ACM CCS 2005, pp. 112\u2013121. ACM Press (2005).","key":"975_CR15","DOI":"10.1145\/1102120.1102137"},{"doi-asserted-by":"crossref","unstructured":"Di Raimondo M., Gennaro R., Krawczyk H.: Deniable authentication and key exchange. In Ari J., Wright R.N., di Vimercati S.D.C. (eds.) In: ACM CCS 2006, pp. 400\u2013409. ACM Press (2006).","key":"975_CR16","DOI":"10.1145\/1180405.1180454"},{"doi-asserted-by":"crossref","unstructured":"Dolev D., Dwork C., Naor M.: Non-malleable cryptography (extended abstract). In: 23rd ACM STOC, pp. 542\u2013552. ACM Press (1991).","key":"975_CR17","DOI":"10.1145\/103418.103474"},{"doi-asserted-by":"crossref","unstructured":"Dowsley R., Hanaoka G., Imai H., Nascimento A.C.: Round-optimal deniable ring authentication in the presence of big brother. In: Chung Y., Yung M. (eds.) WISA 10, vol. 6513, pp. 307\u2013321. LNCS. Springer, Heidelberg (2011).","key":"975_CR18","DOI":"10.1007\/978-3-642-17955-6_23"},{"doi-asserted-by":"crossref","unstructured":"Dwork C., Naor M., Sahai A.: Concurrent zero-knowledge. In: 30th ACM STOC, pp. 409\u2013418. ACM Press (1998).","key":"975_CR19","DOI":"10.1145\/276698.276853"},{"doi-asserted-by":"crossref","unstructured":"ElGamal T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley G.R., Chaum D (eds.) In: CRYPTO\u201984 vol. 196 of LNCS, pp. 10\u201318. Springer, Heidelberg (1984).","key":"975_CR20","DOI":"10.1007\/3-540-39568-7_2"},{"doi-asserted-by":"crossref","unstructured":"Escala A., Herold G., Kiltz E., R\u00e0fols C., Villar J.: An algebraic framework for Diffie-Hellman assumptions. In: Canetti R., Garay J.A. (eds.) CRYPTO 2013, pp. 129\u2013147. Part II, vol. 8043 of LNCS. Springer, Heidelberg (2013).","key":"975_CR21","DOI":"10.1007\/978-3-642-40084-1_8"},{"doi-asserted-by":"crossref","unstructured":"Fiat A., Naor M.: Broadcast encryption. In: Stinson D.R. (ed.) CRYPTO\u201993, vol. 773, pp. 480\u2013491. LNCS. Springer, Heidelberg (1994).","key":"975_CR22","DOI":"10.1007\/3-540-48329-2_40"},{"doi-asserted-by":"crossref","unstructured":"Fujisaki E., Okamoto T.: How to enhance the security of public-key encryption at minimum cost. In: Imai H., Zheng Y. (eds.) PKC\u201999, vol. 1560, pp. 53\u201368. LNCS. Springer, Heidelberg (1999).","key":"975_CR23","DOI":"10.1007\/3-540-49162-7_5"},{"doi-asserted-by":"crossref","unstructured":"Gay R., Kowalczyk L., Wee H.: Tight adaptively secure broadcast encryption with short ciphertexts and keys. In: Catalano D., De Prisco R. (eds.) SCN 18, vol. 11035, pp. 123\u2013139. LNCS. Springer, Heidelberg (2018).","key":"975_CR24","DOI":"10.1007\/978-3-319-98113-0_7"},{"doi-asserted-by":"crossref","unstructured":"Groth J., Sahai A.: Efficient non-interactive proof systems for bilinear groups. In: Smart N.P. (ed.) EUROCRYPT 2008, vol. 4965, pp. 415\u2013432. LNCS. Springer, Heidelberg (2008).","key":"975_CR25","DOI":"10.1007\/978-3-540-78967-3_24"},{"doi-asserted-by":"crossref","unstructured":"Hanaoka G., Kurosawa K.: Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. In: Pieprzyk J. (ed.) ASIACRYPT 2008, vol. 5350, pp. 308\u2013325. LNCS. Springer, Heidelberg (2008).","key":"975_CR26","DOI":"10.1007\/978-3-540-89255-7_19"},{"doi-asserted-by":"crossref","unstructured":"Harkins D., Carrel D. (eds.): The Internet Key Exchange (IKE). RFC 2409 (1998).","key":"975_CR27","DOI":"10.17487\/rfc2409"},{"doi-asserted-by":"crossref","unstructured":"Katz J.: Efficient and non-malleable proofs of plaintext knowledge and applications. In: Biham E. (ed.) EUROCRYPT 2003, vol. 2656, pp. 211\u2013228. LNCS. Springer, Heidelberg (2003).","key":"975_CR28","DOI":"10.1007\/3-540-39200-9_13"},{"doi-asserted-by":"crossref","unstructured":"Naor M.: Deniable ring authentication. In: Yung M. (ed.) CRYPTO 2002, vol. 2442, pp. 481\u2013498. LNCS. Springer, Heidelberg (2002).","key":"975_CR29","DOI":"10.1007\/3-540-45708-9_31"},{"unstructured":"Open Whisper Systems. Signal. http:\/\/signal.org\/ (2016).","key":"975_CR30"},{"doi-asserted-by":"crossref","unstructured":"Pass R.: On deniability in the common reference string and random oracle model. In: Boneh D. (ed.) CRYPTO 2003, vol. 2729, pp. 316\u2013337. LNCS. Springer, Heidelberg (2003).","key":"975_CR31","DOI":"10.1007\/978-3-540-45146-4_19"},{"doi-asserted-by":"crossref","unstructured":"Regev O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow H.N., Fagin R. (eds.) In: 37th ACM STOC, pp. 84\u201393. ACM Press (2005).","key":"975_CR32","DOI":"10.1145\/1060590.1060603"},{"doi-asserted-by":"crossref","unstructured":"Susilo W., Mu Y.: Non-interactive deniable ring authentication. In: Lim J.I., Lee D.H. (eds.) ICISC 03, vol. 2971 of LNCS, pp. 386\u2013401. Springer, Heidelberg (2004).","key":"975_CR33","DOI":"10.1007\/978-3-540-24691-6_29"},{"doi-asserted-by":"crossref","unstructured":"Susilo W., Yi M.: Deniable ring authentication revisited. In: Jakobsson M., Yung M., Zhou J. (eds.) ACNS 04, vol. 3089, pp. 149\u2013163. LNCS. Springer, Heidelberg (2004).","key":"975_CR34","DOI":"10.1007\/978-3-540-24852-1_11"},{"doi-asserted-by":"crossref","unstructured":"Yamada S., Attrapadung N., Santoso B., Schuldt J.C.N., Hanaoka G., Kunihiro N.: Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. In: Fischlin M., Buchmann J., Manulis M. (eds.) PKC 2012, vol. 7293, pp. 243\u2013261. LNCS. Springer, Heidelberg (2012).","key":"975_CR35","DOI":"10.1007\/978-3-642-30057-8_15"},{"issue":"4","key":"975_CR36","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1007\/s12083-016-0433-8","volume":"10","author":"S Zeng","year":"2017","unstructured":"Zeng S., Chen Y., Tan S., He M.: Concurrently deniable ring authentication and its applications to LBS in VANETs. Peer-to-Peer Netw. Appl. 10(4), 844\u2013856 (2017).","journal-title":"Peer-to-Peer Netw. Appl."},{"doi-asserted-by":"crossref","unstructured":"Zeng S., Mu Y., Yang G., He M.: Deniable ring authentication based on projective hash functions. In: Okamoto T., Yu Y., Au M.H., Yannan L. (eds.) ProvSec 2017, vol. 10592 of LNCS, pp. 127\u2013143. Springer, Heidelberg (2017).","key":"975_CR37","DOI":"10.1007\/978-3-319-68637-0_8"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00975-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00975-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00975-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T18:26:08Z","timestamp":1645727168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00975-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,16]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["975"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00975-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2022,1,16]]},"assertion":[{"value":"16 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}