{"id":"https://openalex.org/W7118478860","doi":"https://doi.org/10.1186/s42400-025-00526-7","title":"Lattice-based verifiably encrypted group signatures","display_name":"Lattice-based verifiably encrypted group signatures","publication_year":2026,"publication_date":"2026-01-07","ids":{"openalex":"https://openalex.org/W7118478860","doi":"https://doi.org/10.1186/s42400-025-00526-7"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00526-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00526-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00526-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00526-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037601971","display_name":"Peidong Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peidong Guan","raw_affiliation_strings":["China Telecom Research Institute, Guangzhou, 510660, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"China Telecom Research Institute, Guangzhou, 510660, Guangdong, China","institution_ids":["https://openalex.org/I4210136246"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114022603","display_name":"Shuai Wang","orcid":"https://orcid.org/0009-0005-7117-1055"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Wang","raw_affiliation_strings":["China Telecom Research Institute, Guangzhou, 510660, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"China Telecom Research Institute, Guangzhou, 510660, Guangdong, China","institution_ids":["https://openalex.org/I4210136246"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037601971"],"corresponding_institution_ids":["https://openalex.org/I4210136246"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05253473,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7214999794960022},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7021999955177307},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6980000138282776},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.6962000131607056},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5188000202178955},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.4603999853134155},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.45179998874664307},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.44600000977516174},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4408999979496002}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7214999794960022},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7021999955177307},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6980000138282776},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.6962000131607056},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6348000168800354},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5224999785423279},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5188000202178955},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.4603999853134155},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.45179998874664307},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4489000141620636},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.44600000977516174},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4408999979496002},{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.4293999969959259},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42910000681877136},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.40400001406669617},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.3546999990940094},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.3441999852657318},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.3422999978065491},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.3091000020503998},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.30730000138282776},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.2815999984741211},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.275299996137619},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27410000562667847},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.26910001039505005},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.26910001039505005},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2614000141620636},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00526-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00526-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00526-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c6ff465cc09d4244bda11b0f98487856","is_oa":true,"landing_page_url":"https://doaj.org/article/c6ff465cc09d4244bda11b0f98487856","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-19 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00526-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00526-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00526-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5796921253204346,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7118478860.pdf","grobid_xml":"https://content.openalex.org/works/W7118478860.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W22352682","https://openalex.org/W345037154","https://openalex.org/W1499766499","https://openalex.org/W1499934958","https://openalex.org/W1503167707","https://openalex.org/W1516257339","https://openalex.org/W1530039015","https://openalex.org/W1573033479","https://openalex.org/W1589034595","https://openalex.org/W1592092778","https://openalex.org/W1788452017","https://openalex.org/W1818243338","https://openalex.org/W1964909769","https://openalex.org/W1973413599","https://openalex.org/W1994790157","https://openalex.org/W2007466965","https://openalex.org/W2038761522","https://openalex.org/W2052259180","https://openalex.org/W2102632861","https://openalex.org/W2115449601","https://openalex.org/W2142048307","https://openalex.org/W2142968417","https://openalex.org/W2163614799","https://openalex.org/W2166844482","https://openalex.org/W2168676717","https://openalex.org/W2210874835","https://openalex.org/W2400700555","https://openalex.org/W2552176082","https://openalex.org/W2587477109","https://openalex.org/W2606852569","https://openalex.org/W2766875091","https://openalex.org/W2980154639","https://openalex.org/W2997699823","https://openalex.org/W4205092462","https://openalex.org/W4226307288","https://openalex.org/W4392140874"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Verifiably":[1],"encrypted":[2,95],"signature":[3,97],"(VES)":[4],"schemes":[5],"are":[6,145,161],"extensively":[7],"utilized":[8],"in":[9],"fair":[10],"exchange":[11],"which":[12],"combine":[13],"the":[14,30,37,42,66,78,101,105,112,146,149,156,169],"features":[15],"of":[16,32,39,44,62,114],"encryption":[17],"and":[18,47,119,136,143,155,158],"signature,":[19],"aiming":[20],"to":[21,53,77,81,153],"provide":[22],"a":[23,55,91],"solution":[24,123],"that":[25,58,148],"can":[26,59,73],"not":[27],"only":[28],"verify":[29],"validity":[31],"signatures":[33],"but":[34],"also":[35,74],"safeguard":[36],"privacy":[38],"signatures.":[40],"With":[41],"development":[43],"quantum":[45,48,63],"algorithms":[46],"computing,":[49],"it":[50],"is":[51,108],"necessary":[52],"construct":[54],"VES":[56,79,150],"protocol":[57,80,151],"resist":[60],"attack":[61],"computing.":[64],"At":[65],"same":[67],"time,":[68],"some":[69],"new":[70],"security":[71,129,163],"properties":[72,140,147,160,164],"be":[75],"added":[76],"enhance":[82],"its":[83],"security.":[84],"To":[85],"reach":[86],"this":[87],"goal,":[88],"we":[89],"propose":[90],"state-of-the-art":[92],"lattice-based":[93],"verifiably":[94],"group":[96,170],"(VEGS)":[98],"scheme.":[99],"In":[100],"random":[102],"oracle":[103],"model,":[104],"VEGS":[106],"scheme":[107,126],"provably":[109],"secure":[110],"under":[111],"assumptions":[113],"learning":[115],"with":[116,168],"error":[117],"(LWE)":[118],"inhomogeneous":[120],"small":[121],"integer":[122],"(ISIS).":[124],"Our":[125],"provides":[127],"five":[128],"properties,":[130],"namely":[131],"unforgeability,":[132,141],"opacity,":[133],"extractability,":[134],"anonymity":[135,157],"traceability.":[137],"The":[138],"three":[139],"opacity":[142],"extractability":[144],"needs":[152],"meet,":[154],"traceability":[159],"additional":[162],"brought":[165],"by":[166],"combining":[167],"signature.":[171]},"counts_by_year":[],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2026-01-08T00:00:00"}
