Results 21 to 30 of about 93,479 (169)

Using Ring Learning with Errors Problem to Construct Linkable Ring Signature Scheme

open access: yesJisuanji kexue yu tansuo, 2020
In order to solve the problem of large key size and low efficiency in the linkable ring signature scheme on lattice, this paper reconstructs the linkable ring signature scheme from lattice based on the ring learning with errors (RLWE) problem, according ...
YE Qing, WANG Wenbo, LI Yingying, QIN Panke, ZHAO Zongqu, WANG Yongjun
doaj   +1 more source

On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures

open access: yesIEEE Access, 2020
In this paper, we present an effective code-based linkable ring signature scheme based on Borromean ring signature. The security of the scheme is based on the hardness of Syndrome Decoding problem, General Syndrome Decoding problem and Codeword Finding ...
Yan Ren   +3 more
doaj   +1 more source

Selectively Linkable and Convertible Ring Signature Scheme Based on DLP [PDF]

open access: yesJisuanji gongcheng, 2019
Most of the existing linkable and convertible ring signature schemes do not have strong anonymity.To solve this problem,a ring signature scheme based on Discrete Logarithm Problem(DLP) is proposed.The actual signer establishes an association tag by ...
CAO Suzhen,SUN Han,DAI Wenjie,WANG Xiuya
doaj   +1 more source

Efficient Linkable Ring Signature Scheme [PDF]

open access: yesJisuanji gongcheng
A linkable ring signature, which is a special type of ring signature, can aid in verifying whether two signatures have been signed by the same user, without compromising anonymity. This feature enables it to play an important role in blockchains. However,
ZHAO Jiangdong, CHEN Hu, WANG Xiaoyi
doaj   +1 more source

A New Code‐Based Linkable Threshold Ring Signature Scheme

open access: yesWireless Communications and Mobile Computing, 2022
In this paper, we construct a new code‐based linkable threshold signature scheme whose security is based on the hardness of the syndrome decoding problem and general syndrome decoding problem. We show that our scheme is secure in terms of existential unforgeability, anonymity, nonslanderability, and linkability.
Fang Ren   +4 more
openaire   +1 more source

A Conditionally Anonymous Linkable Ring Signature for Blockchain Privacy Protection

open access: yesComputer systems science and engineering, 2023
In recent years, the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention. To ensure privacy protection for both sides of the transaction, many researchers are using ring signature technology ...
Quan Zhou   +3 more
semanticscholar   +1 more source

Identity-based Linkable Ring Signcryption on NTRU Lattice [PDF]

open access: yesJisuanji kexue
Although the current lattice-based ring signcryption scheme resists quantum attacks,it has large key storage and high encryption/decryption time.The linkable lattice ring signcryption scheme not only can protect signer anonymity,but also can determine ...
TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J
doaj   +1 more source

A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses

open access: yesSecur. Commun. Networks, 2022
Blockchain is a transformational technology which affects finance, Internet, and politics. However, many privacy protection problems for blockchain are waiting to be solved.
Weizhou Li, Zhiqiang Lin, Qi Chen
semanticscholar   +1 more source

Cloud data anonymous assured deletion approach based on blockchain

open access: yesDianxin kexue, 2021
The previous assured deletion schemes ignored that the privacy is threated by the relevance between data and user identity, exposing user behavior to the cloud service provider or attackers.Aiming at the above problems, an assured deletion approach based
Shuangxing WANG   +5 more
doaj   +2 more sources

Privacy-Protected Deletable Blockchain

open access: yesIEEE Access, 2020
A deletable blockchain has been proposed recently to change the immutability of the traditional blockchain. However, the users' identities and transaction contents are all public in the scheme, and the public data may reveal the users' privacy.
Xianji Cai, Yanli Ren, Xinpeng Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy