Results 31 to 40 of about 93,479 (169)

Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions

open access: yesCryptography
Ring signatures are widely used in e-voting, anonymous whistle-blowing systems, and blockchain transactions. However, due to the anonymity of ring signatures, a signer can sign the same message multiple times, potentially leading to repeated voting or ...
Wen Gao   +5 more
doaj   +1 more source

Design of Anonymous Endorsers in Hyperledger Fabric with Linkable Threshold Ring Signature

open access: yesResearch Briefs on Information & Communication Technology Evolution, 2020
Blockchain technology has gained its attention from its application in bitcoin which circumvented the problem of double spending that existed in the prior digital currencies, through validation.
Dharani J   +3 more
doaj   +1 more source

Linkable Ring Signature Scheme Using Biometric Cryptosystem and NIZK and Its Application

open access: yesSecurity and Communication Networks, 2021
Biometric encryption, especially based on fingerprint, plays an important role in privacy protection and identity authentication. In this paper, we construct a privacy-preserving linkable ring signature scheme. In our scheme, we utilize a fuzzy symmetric
Xuechun Mao   +4 more
semanticscholar   +1 more source

Ring Confidential Transactions

open access: yesLedger, 2016
This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process having no central ...
Shen Noether   +2 more
doaj   +1 more source

A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses [PDF]

open access: yes, 2019
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed Linkable Ring Signature and a corresponding Key Derivation Mechanism (KeyDerM) for keeping the payer and payee of a transaction anonymous and unlinkable.
Liu, Zhen   +4 more
openaire   +3 more sources

Polymerized RingCT: An Efficient Linkable Ring Signature for Ring Confidential Transactions in Blockchain

open access: yesJournal of Physics: Conference Series, 2021
In this work, we study and refer the privacy protection protocol used in the blockchain, in particular, the Ring Confidential Transaction protocol in current popular anonymous cryptocurrency Monero.
Junke Duan, L. Gu, Shihui Zheng
semanticscholar   +1 more source

Survey on ring signature

open access: yesTongxin xuebao, 2007
The achievements of ring signature and its applications were surveyed.The majority of the schemes were generalized.The advantages and disadvantages of these schemes were analyzed.Some problems in the study of this field were presented,and several main ...
ZHANG Guo-yin   +2 more
doaj   +2 more sources

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment

open access: yesIEEE Access, 2019
In a ciphertext-policy attribute-based encryption (CP-ABE) system, the decryption keys are only related to attributes shared by multiple users and do not contain any identity information of their original holders.
Xixi Yan, Xu He, Jinxia Yu, Yongli Tang
doaj   +1 more source

Linkable Ring Signatures from Linear Feedback Shift Register [PDF]

open access: yes, 2007
Linkable ring signatures can simultaneously provide the properties of anonymity, spontaneity as well as linkability. Linear feedback shift register (LFSR) sequence can be used to shorten the representation of elements in a field. This paper proposes an LFSR-based linkable ring signature scheme, whose main computation operations are performed in base ...
Dong Zheng   +3 more
openaire   +1 more source

Optimizing signature space performance in privacy-enhanced blockchains: novel ring signature solutions

open access: yesEURASIP Journal on Information Security
In blockchain applications, ring signatures offer significant advantages, particularly in decentralized settings, safeguarding user privacy and data security.
Da Teng, Yanqing Yao, Chao Huang
doaj   +1 more source

Home - About - Disclaimer - Privacy