Results 131 to 140 of about 1,920,406 (199)
Some of the next articles are maybe not open access.
IEEE Transactions on Information Forensics and Security
Ring signatures have been extensively researched for Cloud-assisted Electronic Medical Records (EMRs) sharing, aiming to address the challenge of “medical information silos” while safeguarding the privacy of patients’ personal information and the ...
Xue Chen +5 more
semanticscholar +1 more source
Ring signatures have been extensively researched for Cloud-assisted Electronic Medical Records (EMRs) sharing, aiming to address the challenge of “medical information silos” while safeguarding the privacy of patients’ personal information and the ...
Xue Chen +5 more
semanticscholar +1 more source
Concise RingCT Protocol Based on Linkable Threshold Ring Signature
IEEE Transactions on Dependable and Secure ComputingRing Confidential Transactions (RingCT) is a typical privacy-preserving protocol for blockchain, which is used for the most popular anonymous cryptocurrency Monero in recent years.
Junke Duan +5 more
semanticscholar +1 more source
Efficient Lattice-Based Ring Signature for Message Authentication in VANETs
IEEE Systems Journal, 2020In this article, we propose an efficient lattice-based ring signature scheme for message authentication in vehicular ad-hoc networks (VANETs). It provides unconditional identity privacy preservation, message authentication, and location privacy for the ...
Pravin Mundhe +3 more
semanticscholar +1 more source
Self-certified ring signatures
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011We present a new notion, Self-certified Ring Signature (SCRS), to provide an alternative solution to the certificate management problem in ring signatures and eliminate private key escrow problem in identity based ring signatures. Our scheme captures all features of ring signatures and exhibits the advantages such as low storage, communication and ...
Nan Li, Yi Mu, Willy Susilo, Fuchun Guo
openaire +1 more source
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012
In many applications of group signatures, not only a signer's identity but also which group the signer belongs to is sensitive information regarding signer privacy. In this paper, we study these applications and combine a group signature with a ring signature to create a ring group signature, which specifies a set of possible groups without revealing ...
openaire +1 more source
In many applications of group signatures, not only a signer's identity but also which group the signer belongs to is sensitive information regarding signer privacy. In this paper, we study these applications and combine a group signature with a ring signature to create a ring group signature, which specifies a set of possible groups without revealing ...
openaire +1 more source
Nominative Proxy Ring Signature
2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, 2009In a nominative proxy ring signature scheme, an original signer delegates his nominative signing power to some proxies forming a ring. The member of the ring can generate a nominative signature on behalf of the original signer and the ring. In a nominative proxy ring signature scheme, only the nominee can verify the ring signature and if necessary ...
Chengyu Hu, Pengtao Liu, Guoyan Zhang
openaire +1 more source
A certificateless ring signature scheme with batch verification for applications in VANET
Journal of Information Security and Applications, 2020One of the most important challenges in secure and efficient communications for Vehicular Ad hoc NETworks (VANET) is proposing an appropriate authentication scheme.
Samra Bouakkaz, F. Semchedine
semanticscholar +1 more source
2009
In this paper, we propose the concept of a relinkable ring signature, which is a ring signature with ring reformation function, i.e., a signer can delegate ring reformation ability separately from signing ability to his/her proxy. The relinkable ring signature can be applicable to proxy ring reformation, anonymization of past-generated signature, or ...
Koutarou Suzuki +2 more
openaire +1 more source
In this paper, we propose the concept of a relinkable ring signature, which is a ring signature with ring reformation function, i.e., a signer can delegate ring reformation ability separately from signing ability to his/her proxy. The relinkable ring signature can be applicable to proxy ring reformation, anonymization of past-generated signature, or ...
Koutarou Suzuki +2 more
openaire +1 more source
Identity Based Threshold Ring Signature
2005In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n – t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks.
Yiu, SM, Chow, SSM, Hui, LCK
openaire +2 more sources
2007
This paper introduces a new concept called controllable ring signature which is ring signature with additional properties as follow. (1) Anonymous identification: by an anonymous identification protocol, the real signer can anonymously prove his authorship of the ring signature to the verifier. And this proof is non-transferable. (2) Linkable signature:
Gao, Wei +3 more
openaire +1 more source
This paper introduces a new concept called controllable ring signature which is ring signature with additional properties as follow. (1) Anonymous identification: by an anonymous identification protocol, the real signer can anonymously prove his authorship of the ring signature to the verifier. And this proof is non-transferable. (2) Linkable signature:
Gao, Wei +3 more
openaire +1 more source

