Results 111 to 120 of about 1,920,406 (199)

Signatures on a Ring

open access: yesSignatures on a Ring
openaire  

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks

IEEE Transactions on Intelligent Vehicles, 2023
Vehicle-to-Grid (V2G) networks are potential solutions to addressing energy and environmental challenges, although security remains a key concern. For example, attackers may seek to obtain private information from frequent electricity/service exchanges ...
Yulin Liu   +5 more
semanticscholar   +1 more source

Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing

IEEE Transactions on Cloud Computing, 2022
Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing.
Zhiwei Wang, Jiaxing Fan
semanticscholar   +1 more source

Certificateless Threshold Ring Signature

Information Sciences, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang   +3 more
openaire   +2 more sources

A certificateless ring signature scheme based on lattice

Concurrency and Computation, 2022
For the problems that ring signature needs key escrow, has some security risks, and cannot avoid malicious key generation center (KGC) in the post‐quantum era, we design a certificateless ring signature scheme based on lattice (L‐CRSS).
Songshou Dong   +3 more
semanticscholar   +1 more source

An efficient multivariate threshold ring signature scheme

Comput. Stand. Interfaces, 2021
At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability 2 3 . Petzoldt et al.
D. Duong   +3 more
semanticscholar   +1 more source

Ring proxy signatures

Journal of Electronics (China), 2008
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an ...
Baodian Wei   +2 more
openaire   +1 more source

Generalized Ring Signatures

IEEE Transactions on Dependable and Secure Computing, 2008
Ring signature was first introduced in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, she is unable to tell which member actually produced the signature.
J. Ren, L. Harn
openaire   +1 more source

Home - About - Disclaimer - Privacy