Results 121 to 130 of about 1,920,406 (199)
Some of the next articles are maybe not open access.
Journal of Computer Science and Technology, 2007
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Ring signature, on the other hand, does not allow anyone to revoke the signer anonymity, while allowing the real signer to form a group ...
Liu, Dennis Y.W. +4 more
openaire +2 more sources
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Ring signature, on the other hand, does not allow anyone to revoke the signer anonymity, while allowing the real signer to form a group ...
Liu, Dennis Y.W. +4 more
openaire +2 more sources
Anonymity-Enhanced Sequential Multi-Signer Ring Signature for Secure Medical Data Sharing in IoMT
IEEE Transactions on Information Forensics and SecurityInternet of Medical Things (IoMT) has garnered significant research attention from both academic and medical institutions. However, the sensitive medical data involved in IoMT raises security and privacy concerns.
Gang Xu +6 more
semanticscholar +1 more source
IEEE Transactions on Industrial Informatics
The Industrial Internet of Things (IIoT) has been widely studied, which dramatically enhanced the manufacturing efficiency and service elasticity.
Gang Xu +6 more
semanticscholar +1 more source
The Industrial Internet of Things (IIoT) has been widely studied, which dramatically enhanced the manufacturing efficiency and service elasticity.
Gang Xu +6 more
semanticscholar +1 more source
IEE Proceedings - Communications, 2005
A ring signature scheme enables a signer to produce a signature without revealing their identity. A verifier can verify that the ring signature was made by a ring member, but cannot identify the real signer. A convertible ring signature scheme is proposed that allows the real signer to convert a ring signature into an ordinary signature by revealing ...
K.-C. Lee, H.-A. Wen, T. Hwang
openaire +1 more source
A ring signature scheme enables a signer to produce a signature without revealing their identity. A verifier can verify that the ring signature was made by a ring member, but cannot identify the real signer. A convertible ring signature scheme is proposed that allows the real signer to convert a ring signature into an ordinary signature by revealing ...
K.-C. Lee, H.-A. Wen, T. Hwang
openaire +1 more source
A Ring Signature With Aggregation for Ensuring Privacy in Blockchain Transactions
IEEE Internet of Things JournalRing signatures are a crucial cryptographic tool underpinning blockchains and blockchain-based systems, and there are ongoing efforts to design different ring signatures to provide varying properties in a range of applications (e.g., batch verification ...
Xiaohui Tong +4 more
semanticscholar +1 more source
TRIFORS: LINKable Trilinear Forms Ring Signature
IACR Cryptology ePrint ArchiveWe present TRIFORS (TRIlinear FOrms Ring Signature), a logarithmic post-quantum (linkable) ring signature based on a novel assumption regarding equivalence of alternating trilinear forms.
Giuseppe D’Alconzo, Andrea Gangemi
semanticscholar +1 more source
LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs
IEEE Transactions on Vehicular TechnologyVehicular ad-hoc networks (VANETs) have drawn a lot of attention for their potential to improve traffic efficiency and safety. To deal with anonymous authentication and message integrity during communication, many protocols have been designed.
Jiaming Wen +5 more
semanticscholar +1 more source
Nominative Signature from Ring Signature
2007Since the introduction of nominative signature (NS) in 1996, there have been a handful of schemes proposed and almost all of them have been found flawed. The only one which is secure requires multiround of communications between the nominator and the nominee for signature generation. In this paper, we propose a novel construction which is efficient and
Dennis Y. W. Liu +3 more
openaire +1 more source
Signatures and Semi Signatures of Abstract Witt Rings and Witt Rings of Semilocal Rings
Canadian Journal of Mathematics, 1978This paper originated in an attempt to carry over the results of [3] from the case of a field of characteristic different from two to that of semilocal rings. To carry this out, we reverse the point of view of [3] and do assume a full knowledge of the theory of Witt rings of classes of nondegenerate symmetric bilinear forms over semilocal rings as ...
Kleinstein, Jerrold L., Rosenberg, Alex
openaire +1 more source
Confessible Threshold Ring Signatures
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006We present two threshold ring signature schemes with different properties. One focuses on the confessibility (or signer verifiability) and the denouncibility properties. The other focuses on the threshold-confessibility. Our schemes are built on generic ring signature schemes and can be easily adapted to most existing ring signature schemes.
Yu-shian Chen +3 more
openaire +1 more source

