Results 31 to 40 of about 93,479 (169)
Ring signatures are widely used in e-voting, anonymous whistle-blowing systems, and blockchain transactions. However, due to the anonymity of ring signatures, a signer can sign the same message multiple times, potentially leading to repeated voting or ...
Wen Gao +5 more
doaj +1 more source
Design of Anonymous Endorsers in Hyperledger Fabric with Linkable Threshold Ring Signature
Blockchain technology has gained its attention from its application in bitcoin which circumvented the problem of double spending that existed in the prior digital currencies, through validation.
Dharani J +3 more
doaj +1 more source
Linkable Ring Signature Scheme Using Biometric Cryptosystem and NIZK and Its Application
Biometric encryption, especially based on fingerprint, plays an important role in privacy protection and identity authentication. In this paper, we construct a privacy-preserving linkable ring signature scheme. In our scheme, we utilize a fuzzy symmetric
Xuechun Mao +4 more
semanticscholar +1 more source
Ring Confidential Transactions
This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process having no central ...
Shen Noether +2 more
doaj +1 more source
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses [PDF]
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed Linkable Ring Signature and a corresponding Key Derivation Mechanism (KeyDerM) for keeping the payer and payee of a transaction anonymous and unlinkable.
Liu, Zhen +4 more
openaire +3 more sources
In this work, we study and refer the privacy protection protocol used in the blockchain, in particular, the Ring Confidential Transaction protocol in current popular anonymous cryptocurrency Monero.
Junke Duan, L. Gu, Shihui Zheng
semanticscholar +1 more source
The achievements of ring signature and its applications were surveyed.The majority of the schemes were generalized.The advantages and disadvantages of these schemes were analyzed.Some problems in the study of this field were presented,and several main ...
ZHANG Guo-yin +2 more
doaj +2 more sources
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment
In a ciphertext-policy attribute-based encryption (CP-ABE) system, the decryption keys are only related to attributes shared by multiple users and do not contain any identity information of their original holders.
Xixi Yan, Xu He, Jinxia Yu, Yongli Tang
doaj +1 more source
Linkable Ring Signatures from Linear Feedback Shift Register [PDF]
Linkable ring signatures can simultaneously provide the properties of anonymity, spontaneity as well as linkability. Linear feedback shift register (LFSR) sequence can be used to shorten the representation of elements in a field. This paper proposes an LFSR-based linkable ring signature scheme, whose main computation operations are performed in base ...
Dong Zheng +3 more
openaire +1 more source
In blockchain applications, ring signatures offer significant advantages, particularly in decentralized settings, safeguarding user privacy and data security.
Da Teng, Yanqing Yao, Chao Huang
doaj +1 more source

