{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T03:26:07Z","timestamp":1720754767277},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001849","name":"Defence Research and Development Organisation","doi-asserted-by":"publisher","award":["ERIP\/ER\/202005001\/M\/01\/1775"],"id":[{"id":"10.13039\/501100001849","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1016\/j.jisa.2023.103474","type":"journal-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T12:24:40Z","timestamp":1679574280000},"page":"103474","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["On the security of multivariate-based ring signature and other related primitives"],"prefix":"10.1016","volume":"74","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9743-6104","authenticated-orcid":false,"given":"Vikas","family":"Srivastava","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6374-1410","authenticated-orcid":false,"given":"Sumit Kumar","family":"Debnath","sequence":"additional","affiliation":[]},{"given":"Sharwan Kumar","family":"Tiwari","sequence":"additional","affiliation":[]},{"given":"Harshdeep","family":"Singh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103474_b1","series-title":"Computers and intractability, Vol. 174","author":"Garey","year":"1979"},{"key":"10.1016\/j.jisa.2023.103474_b2","first-page":"1418","article-title":"Extended algorithm for solving underdefined multivariate quadratic equations","volume":"97-A","author":"Miura","year":"2013","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"10.1016\/j.jisa.2023.103474_b3","series-title":"International conference on the theory and applications of cryptographic techniques","first-page":"206","article-title":"Unbalanced oil and vinegar signature schemes","author":"Kipnis","year":"1999"},{"key":"10.1016\/j.jisa.2023.103474_b4","series-title":"International workshop on post-quantum cryptography","first-page":"40","article-title":"A polynomial-time algorithm for solving a class of underdetermined multivariate quadratic equations over fields of odd characteristics","author":"Cheng","year":"2014"},{"key":"10.1016\/j.jisa.2023.103474_b5","series-title":"International workshop on public key cryptography","first-page":"211","article-title":"Solving underdefined systems of multivariate quadratic equations","author":"Courtois","year":"2002"},{"key":"10.1016\/j.jisa.2023.103474_b6","series-title":"International workshop on public key cryptography","first-page":"156","article-title":"Solving underdetermined systems of multivariate quadratic equations revisited","author":"Thomae","year":"2012"},{"issue":"10","key":"10.1016\/j.jisa.2023.103474_b7","doi-asserted-by":"crossref","first-page":"3973","DOI":"10.1016\/j.camwa.2011.09.052","article-title":"Ring signature scheme based on multivariate public key cryptosystems","volume":"62","author":"Wang","year":"2011","journal-title":"Comput Math Appl"},{"key":"10.1016\/j.jisa.2023.103474_b8","series-title":"Applied mechanics and materials, Vol. 380","first-page":"1899","article-title":"A verifiable ring signature scheme based on multivariate public-key cryptosystem","author":"Wang","year":"2013"},{"key":"10.1016\/j.jisa.2023.103474_b9","series-title":"Proceedings of the international conference on computing and communication systems","first-page":"623","article-title":"Multivariate linkable group signature scheme","author":"Omar","year":"2021"},{"key":"10.1016\/j.jisa.2023.103474_b10","unstructured":"Akleylek Sedat, Demircioglu Murat, Cenk Murat. GUI Based Ring Signature Scheme. In: 18th Central European conference on cryptology (CECC 2018), Smolenice. 2018."},{"issue":"1","key":"10.1016\/j.jisa.2023.103474_b11","first-page":"35","article-title":"Efficient GeMSS based ring signature scheme","volume":"3","author":"Demircioglu","year":"2020","journal-title":"Malays J Comput Appl Math"},{"issue":"177","key":"10.1016\/j.jisa.2023.103474_b12","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math Comp"},{"issue":"2","key":"10.1016\/j.jisa.2023.103474_b13","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun ACM"},{"key":"10.1016\/j.jisa.2023.103474_b14","series-title":"Digital signature algorithm","author":"Kravitz","year":"1993"},{"issue":"2","key":"10.1016\/j.jisa.2023.103474_b15","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"41","author":"Shor","year":"1999","journal-title":"SIAM Rev"},{"issue":"7671","key":"10.1016\/j.jisa.2023.103474_b16","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1038\/nature23461","article-title":"Post-quantum cryptography","volume":"549","author":"Bernstein","year":"2017","journal-title":"Nature"},{"key":"10.1016\/j.jisa.2023.103474_b17","series-title":"Report on post-quantum cryptography, Vol. 12","author":"Chen","year":"2016"},{"key":"10.1016\/j.jisa.2023.103474_b18","series-title":"International workshop on cryptographic hardware and embedded systems","first-page":"45","article-title":"Time-area optimized public-key engines: MQ cryptosystems as replacement for elliptic curves?","author":"Bogdanov","year":"2008"},{"key":"10.1016\/j.jisa.2023.103474_b19","series-title":"International workshop on cryptographic hardware and embedded systems","first-page":"33","article-title":"SSE implementation of multivariate PKCs on modern x86 CPUs","author":"Chen","year":"2009"},{"key":"10.1016\/j.jisa.2023.103474_b20","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/3-540-45961-8_39","article-title":"Public quadratic polynomial-tuples for efficient signature-verification and message-encryption","author":"Matsumoto","year":"1988"},{"key":"10.1016\/j.jisa.2023.103474_b21","series-title":"Public key cryptography (1)","first-page":"242","article-title":"Multivariate public key cryptosystem from sidon spaces","author":"Raviv","year":"2021"},{"key":"10.1016\/j.jisa.2023.103474_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2020.103489","article-title":"An efficient multivariate threshold ring signature scheme","volume":"74","author":"Duong","year":"2021","journal-title":"Comput Stand Interfaces"},{"issue":"8","key":"10.1016\/j.jisa.2023.103474_b23","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1093\/comjnl\/bxz128","article-title":"A multivariate blind ring signature scheme","volume":"63","author":"Hoang Duong","year":"2020","journal-title":"Comput J"},{"key":"10.1016\/j.jisa.2023.103474_b24","article-title":"A secure and efficient group signature scheme based on multivariate public key cryptography","volume":"58","author":"Kundu","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.jisa.2023.103474_b25","article-title":"UOV-pepper: New public key short signature in degree 3","author":"Macario-Rat","year":"2021","journal-title":"Cryptol EPrint Arch"},{"key":"10.1016\/j.jisa.2023.103474_b26","first-page":"429","article-title":"New practical multivariate signatures from a nonlinear modifier","volume":"2021","author":"Smith-Tone","year":"2021","journal-title":"IACR Cryptol EPrint Arch"},{"key":"10.1016\/j.jisa.2023.103474_b27","article-title":"A multivariate identity-based broadcast encryption with applications to the internet of things","author":"Srivastava","year":"2021","journal-title":"Adv Math Commun"},{"key":"10.1016\/j.jisa.2023.103474_b28","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.tcs.2019.12.032","article-title":"A new encryption scheme for multivariate quadratic systems","volume":"809","author":"Chen","year":"2020","journal-title":"Theoret Comput Sci"},{"key":"10.1016\/j.jisa.2023.103474_b29","series-title":"International conference on cryptology in Africa","first-page":"3","article-title":"RingRainbow\u2013an efficient multivariate ring signature scheme","author":"Mohamed","year":"2017"},{"key":"10.1016\/j.jisa.2023.103474_b30","series-title":"Applied mechanics and materials, Vol. 347","first-page":"2688","article-title":"A new multivariate-based ring signature scheme","author":"Wang","year":"2013"},{"issue":"3","key":"10.1016\/j.jisa.2023.103474_b31","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00200-013-0190-3","article-title":"A multivariate based threshold ring signature scheme","volume":"24","author":"Petzoldt","year":"2013","journal-title":"Appl Algebra Eng Commun Comput"},{"key":"10.1016\/j.jisa.2023.103474_b32","series-title":"International conference on the theory and application of cryptology and information security","first-page":"552","article-title":"How to leak a secret","author":"Rivest","year":"2001"},{"key":"10.1016\/j.jisa.2023.103474_b33","series-title":"An e-voting system based on blockchain and ring signature","author":"Wu","year":"2017"},{"key":"10.1016\/j.jisa.2023.103474_b34","series-title":"2013 IEEE global communications conference","first-page":"867","article-title":"RE-NOTE: An E-voting scheme based on ring signature and clash attack protection","author":"Pan","year":"2013"},{"issue":"2","key":"10.1016\/j.jisa.2023.103474_b35","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s11859-019-1382-x","article-title":"An association ring signature for block chain e-money transactions","volume":"24","author":"Yang","year":"2019","journal-title":"Wuhan Univ J Nat Sci"},{"key":"10.1016\/j.jisa.2023.103474_b36","series-title":"2020 3rd international conference on smart blockchain (SmartBlock)","first-page":"1","article-title":"A linkable ring signature electronic cash scheme based on blockchain","author":"Liu","year":"2020"},{"issue":"5","key":"10.1016\/j.jisa.2023.103474_b37","doi-asserted-by":"crossref","first-page":"575","DOI":"10.26599\/TST.2018.9010131","article-title":"Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks","volume":"24","author":"Liu","year":"2019","journal-title":"Tsinghua Sci Technol"},{"issue":"4","key":"10.1016\/j.jisa.2023.103474_b38","doi-asserted-by":"crossref","first-page":"5463","DOI":"10.1109\/JSYST.2020.2980297","article-title":"Efficient Lattice-Based ring signature for message authentication in VANETs","volume":"14","author":"Mundhe","year":"2020","journal-title":"IEEE Syst J"},{"key":"10.1016\/j.jisa.2023.103474_b39","series-title":"ICC 2020 - 2020 IEEE international conference on communications","first-page":"1","article-title":"Ring selection for ring signature-based privacy protection in VANETs","author":"Wang","year":"2020"},{"key":"10.1016\/j.jisa.2023.103474_b40","series-title":"International colloquium on automata, languages, and programming","first-page":"423","article-title":"Ring signatures of sub-linear size without random oracles","author":"Chandran","year":"2007"},{"key":"10.1016\/j.jisa.2023.103474_b41","unstructured":"Bose Priyanka, Das Dipanjan, Rangan C Pandu. Constant size ring signature without random oracle. Cryptology eprint archive, report 2015\/164, 2015, https:\/\/ia.cr\/2015\/164."},{"key":"10.1016\/j.jisa.2023.103474_b42","unstructured":"Petzoldt Dipl-Math Albrecht. Selecting and Reducing Key Sizes for Multivariate Cryptography."},{"key":"10.1016\/j.jisa.2023.103474_b43","series-title":"International conference on applied cryptography and network security","first-page":"164","article-title":"Rainbow, a new multivariable polynomial signature scheme","author":"Ding","year":"2005"},{"key":"10.1016\/j.jisa.2023.103474_b44","series-title":"SageMath, the sage mathematics software system (version 9.0)","author":"The Sage Developers","year":"2022"},{"key":"10.1016\/j.jisa.2023.103474_b45","series-title":"Multivariate public key cryptosystems","article-title":"Multivariate cryptography","author":"Ding","year":"2020"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623000583?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623000583?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:59:17Z","timestamp":1718499557000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623000583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":45,"alternative-id":["S2214212623000583"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103474","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2023,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On the security of multivariate-based ring signature and other related primitives","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103474","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103474"}}