Results 121 to 130 of about 1,920,406 (199)
Some of the next articles are maybe not open access.

Revocable Ring Signature

Journal of Computer Science and Technology, 2007
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Ring signature, on the other hand, does not allow anyone to revoke the signer anonymity, while allowing the real signer to form a group ...
Liu, Dennis Y.W.   +4 more
openaire   +2 more sources

Anonymity-Enhanced Sequential Multi-Signer Ring Signature for Secure Medical Data Sharing in IoMT

IEEE Transactions on Information Forensics and Security
Internet of Medical Things (IoMT) has garnered significant research attention from both academic and medical institutions. However, the sensitive medical data involved in IoMT raises security and privacy concerns.
Gang Xu   +6 more
semanticscholar   +1 more source

RAT Ring: Event Driven Publish/Subscribe Communication Protocol for IIoT by Report and Traceable Ring Signature

IEEE Transactions on Industrial Informatics
The Industrial Internet of Things (IIoT) has been widely studied, which dramatically enhanced the manufacturing efficiency and service elasticity.
Gang Xu   +6 more
semanticscholar   +1 more source

Convertible ring signature

IEE Proceedings - Communications, 2005
A ring signature scheme enables a signer to produce a signature without revealing their identity. A verifier can verify that the ring signature was made by a ring member, but cannot identify the real signer. A convertible ring signature scheme is proposed that allows the real signer to convert a ring signature into an ordinary signature by revealing ...
K.-C. Lee, H.-A. Wen, T. Hwang
openaire   +1 more source

A Ring Signature With Aggregation for Ensuring Privacy in Blockchain Transactions

IEEE Internet of Things Journal
Ring signatures are a crucial cryptographic tool underpinning blockchains and blockchain-based systems, and there are ongoing efforts to design different ring signatures to provide varying properties in a range of applications (e.g., batch verification ...
Xiaohui Tong   +4 more
semanticscholar   +1 more source

TRIFORS: LINKable Trilinear Forms Ring Signature

IACR Cryptology ePrint Archive
We present TRIFORS (TRIlinear FOrms Ring Signature), a logarithmic post-quantum (linkable) ring signature based on a novel assumption regarding equivalence of alternating trilinear forms.
Giuseppe D’Alconzo, Andrea Gangemi
semanticscholar   +1 more source

LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs

IEEE Transactions on Vehicular Technology
Vehicular ad-hoc networks (VANETs) have drawn a lot of attention for their potential to improve traffic efficiency and safety. To deal with anonymous authentication and message integrity during communication, many protocols have been designed.
Jiaming Wen   +5 more
semanticscholar   +1 more source

Nominative Signature from Ring Signature

2007
Since the introduction of nominative signature (NS) in 1996, there have been a handful of schemes proposed and almost all of them have been found flawed. The only one which is secure requires multiround of communications between the nominator and the nominee for signature generation. In this paper, we propose a novel construction which is efficient and
Dennis Y. W. Liu   +3 more
openaire   +1 more source

Signatures and Semi Signatures of Abstract Witt Rings and Witt Rings of Semilocal Rings

Canadian Journal of Mathematics, 1978
This paper originated in an attempt to carry over the results of [3] from the case of a field of characteristic different from two to that of semilocal rings. To carry this out, we reverse the point of view of [3] and do assume a full knowledge of the theory of Witt rings of classes of nondegenerate symmetric bilinear forms over semilocal rings as ...
Kleinstein, Jerrold L., Rosenberg, Alex
openaire   +1 more source

Confessible Threshold Ring Signatures

2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006
We present two threshold ring signature schemes with different properties. One focuses on the confessibility (or signer verifiability) and the denouncibility properties. The other focuses on the threshold-confessibility. Our schemes are built on generic ring signature schemes and can be easily adapted to most existing ring signature schemes.
Yu-shian Chen   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy