|
[1]
|
Q. Alamélou, O. Blazy, S. Cauchie and P. Gaborit, A code-based group signature scheme, The 9th International Workshop on Coding and Cryptography–WCC, 2015.
|
|
[2]
|
Q. Alamélou, O. Blazy, S. Cauchie and P. Gaborit, A code-based group signature scheme, Des. Codes Cryptogr., 82 (2017), 469-493.
doi: 10.1007/s10623-016-0276-6.
|
|
[3]
|
H. Assidi, E. B. Ayebie and E. M. Souidi, A code-based group signature scheme with shorter public key length, International Conference on Security and Cryptography, SCITEPRESS, 2 (2016), 432-439.
|
|
[4]
|
D. Augot, M. Finiasz and N. Sendrier, A fast provably secure cryptographic hash function, Cryptology ePrint Archive, 2003.
|
|
[5]
|
B. E. Ayebie, H. Assidi and E. M. Souidi, A new dynamic code-based group signature scheme, Codes, Cryptology and Information Security, Lecture Notes in Computer Science, Springer, Cham, 10194 (2017), 346-364.
doi: 10.1007/978-3-319-55589-8_23.
|
|
[6]
|
A. Barg, Complexity issues in coding theory, Handbook of Coding Theory North-Holland, Amsterdam, 1/2 (1998), 649-754.
|
|
[7]
|
M. Bellare, D. Micciancio and B. Warinschi, Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, Advances in Cryptology–EUROCRYPT 2003, Lecture Notes in Computer Science, Springer, Berlin, 2656 (2003), 614-629.
doi: 10.1007/3-540-39200-9_38.
|
|
[8]
|
M. Bellare, H. Shi and C. Zhang, Foundations of group signatures: The case of dynamic groups, Topics in Cryptology-CT-RSA 2005, Lecture Notes in Computer Science, Springer, Berlin, 3376 (2005), 136-153.
doi: 10.1007/978-3-540-30574-3_11.
|
|
[9]
|
E. Berlekamp, R. McEliece and H. V. Tilborg, On the inherent intractability of certain coding problems (corresp.), IEEE Transactions on Information Theory, 24 (1978), 384-386.
doi: 10.1109/tit.1978.1055873.
|
|
[10]
|
D. Boneh, X. Boyen and H. Shacham, Short group signatures, Advances in Cryptology-CRYPTO 2004, Lecture Notes in Computer Science, Springer, Berlin, 3152 (2004), 41-55.
doi: 10.1007/978-3-540-28628-8_3.
|
|
[11]
|
J. Bootle, A. Cerulli, P. Chaidos, E. Ghadafi and J. Groth, Foundations of fully dynamic group signatures, Applied Cryptography and Network Security, Lecture Notes in Computer Science, Springer, Cham, 9696 (2016), 117-136.
doi: 10.1007/978-3-319-39555-5_7.
|
|
[12]
|
X. Boyen and B. Waters, Compact group signatures without random oracles, Advances in Cryptology–EUROCRYPT 2006, Lecture Notes in Computer Science, Springer, Berlin, 4004 (2006), 427-444.
doi: 10.1007/11761679_26.
|
|
[13]
|
E. Bresson and J. Stern, Efficient revocation in group signatures, Public Key Cryptography–PKC 2001, Lecture Notes in Computer Science, Springer, Berlin, 1992 (2001), 190-206.
doi: 10.1007/3-540-44586-2_15.
|
|
[14]
|
E. Brickell, D. Pointcheval, S. Vaudenay and M. Yung, Design validations for discrete logarithm based signature schemes, Public Key Cryptography, Lecture Notes in Computer Science, Springer, Berlin, 1751 (2000), 276-292.
doi: 10.1007/978-3-540-46588-1_19.
|
|
[15]
|
D. Chaum and E. V. Heyst, Group signatures, Advances in Cryptology–EUROCRYPT 1991, Lecture Notes in Computer Science, Springer, Berlin, 547 (1991), 257-265.
|
|
[16]
|
N. T. Courtois, M. Finiasz and N. Sendrier, How to achieve a mceliece-based digital signature scheme, Advances in Cryptology–ASIACRYPT 2001, Lecture Notes in Computer Science, Springer, Berlin, 2248 (2001), 157-174.
doi: 10.1007/3-540-45682-1_10.
|
|
[17]
|
M. F. Ezerman, H. T. Lee, S. Ling, K. Nguyen and H. Wang, A provably secure group signature scheme from code-based assumptions, Advances in Cryptology–ASIACRYPT 2015, Lecture Notes in Computer Science, Springer, Berlin, 9452 (2015), 260-285.
doi: 10.1007/978-3-662-48797-6_12.
|
|
[18]
|
M. F. Ezerman, H. T. Lee, S. Ling, K. Nguyen and H. Wang, Provably secure group signature schemes from code-based assumptions, IEEE Trans. Inform. Theory, 66 (2020), 5754-5773.
doi: 10.1109/TIT.2020.2976073.
|
|
[19]
|
A. Fiat and A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptology–CRYPTO'86, Lecture Notes in Computer Science, Springer, Berlin, 263 (1987), 186-194.
doi: 10.1007/3-540-47721-7_12.
|
|
[20]
|
S. D. Gordon, J. Katz and V. Vaikuntanathan, A group signature scheme from lattice assumptions, Advances in Cryptology–ASIACRYPT 2010, Lecture Notes in Computer Science, Springer, Berlin, 6477 (2010), 395-412.
doi: 10.1007/978-3-642-17373-8_23.
|
|
[21]
|
A. Ishida, K. Emura, G. Hanaoka, Y. Sakai and K. Tanaka, Group signature with deniability: How to disavow a signature, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 100 (2017), 1825-1837.
|
|
[22]
|
F. Laguillaumie, A. Langlois, B. Libert and D. Stehlé, Lattice-based group signatures with logarithmic signature size, Advances in Cryptology–ASIACRYPT 2013, Lecture Notes in Computer Science, Springer, Berlin, 8270 (2013), 41-61.
doi: 10.1007/978-3-642-42045-0_3.
|
|
[23]
|
A. Langlois, S. Ling, K. Nguyen and H. Wang, Lattice-based group signature scheme with verifier-local revocation, Public-Key Cryptography–PKC 2014, Lecture Notes in Computer Science, Springer, Berlin, 8383 (2014), 345-361.
doi: 10.1007/978-3-642-54631-0_20.
|
|
[24]
|
B. Libert, S. Ling, F. Mouhartem, K. Nguyen and H. Wang, Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions, Advances in Cryptology–ASIACRYPT 2016, Lecture Notes in Computer Science, Springer, Berlin, 10032 (2016), 373-403.
doi: 10.1007/978-3-662-53890-6_13.
|
|
[25]
|
B. Libert, S. Ling, K. Nguyen and H. Wang, Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors, Advances in Cryptology–EUROCRYPT 2016, Lecture Notes in Computer Science, Springer, Berlin, 9666 (2016), 1-31.
doi: 10.1007/978-3-662-49896-5_1.
|
|
[26]
|
B. Libert, F. Mouhartem and K. Nguyen, A lattice-based group signature scheme with message-dependent opening, Applied Cryptography and Network Security, Lecture Notes in Computer Science, Springer, Cham, 9696 (2016), 137-155.
doi: 10.1007/978-3-319-39555-5_8.
|
|
[27]
|
B. Libert, T. Peters and M. Yung, Scalable group signatures with revocation, Advances in Cryptology–EUROCRYPT 2012, Lecture Notes in Computer Science, Springer, Berlin, 7237 (2012), 609-627.
doi: 10.1007/978-3-642-29011-4_36.
|
|
[28]
|
S. Ling, K. Nguyen and H. Wang, Group signatures from lattices: Simpler, tighter, shorter, ring-based, Public-Key Cryptography–PKC 2015, Lecture Notes in Computer Science, Springer, Berlin, 9020 (2015), 427-449.
doi: 10.1007/978-3-662-46447-2_19.
|
|
[29]
|
S. Ling, K. Nguyen, H. Wang and Y. Xu, Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease, Theoret. Comput. Sci., 783 (2019), 71-94.
doi: 10.1016/j.tcs.2019.03.023.
|
|
[30]
|
F. J. MacWilliams and N. J. Sloane, The Theory of Error-Correcting Codes, North-Holland Mathematical Library, Vol. 16. North-Holland Publishing Co., Amsterdam-New York-Oxford, 1977.
|
|
[31]
|
M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, (1990), 427-437.
|
|
[32]
|
K. Nguyen, H. Tang, H. Wang and N. Zeng, New code-based privacy-preserving cryptographic constructions, Advances in Cryptology–ASIACRYPT 2019, Lecture Notes in Computer Science, Springer, Cham, 11922 (2019), 25-55.
|
|
[33]
|
P. Q. Nguyen, J. Zhang and Z. Zhang, Simpler efficient group signatures from lattices, Public-Key Cryptography–PKC 2015, Lecture Notes in Computer Science, Springer, Berlin, 9020 (2015), 401-426.
doi: 10.1007/978-3-662-46447-2_18.
|
|
[34]
|
R. Nojima, H. Imai, K. Kobara and K. Morozov, Semantic security for the mceliece cryptosystem without random oracles, Des. Codes Cryptogr., 49 (2008), 289-305.
doi: 10.1007/s10623-008-9175-9.
|
|
[35]
|
J. Stern, A new paradigm for public key identification, IEEE Trans. Inform. Theory, 42 (1996), 1757-1768.
doi: 10.1109/18.556672.
|
|
[36]
|
G. Tsudik and S. Xu, Accumulating composites and improved group signing, Advances in Cryptology–ASIACRYPT 2003, Lecture Notes in Computer Science, Springer, Berlin, 2894 (2003), 269-286.
doi: 10.1007/978-3-540-40061-5_16.
|