Results 131 to 140 of about 1,920,406 (199)
Some of the next articles are maybe not open access.

FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records

IEEE Transactions on Information Forensics and Security
Ring signatures have been extensively researched for Cloud-assisted Electronic Medical Records (EMRs) sharing, aiming to address the challenge of “medical information silos” while safeguarding the privacy of patients’ personal information and the ...
Xue Chen   +5 more
semanticscholar   +1 more source

Concise RingCT Protocol Based on Linkable Threshold Ring Signature

IEEE Transactions on Dependable and Secure Computing
Ring Confidential Transactions (RingCT) is a typical privacy-preserving protocol for blockchain, which is used for the most popular anonymous cryptocurrency Monero in recent years.
Junke Duan   +5 more
semanticscholar   +1 more source

Efficient Lattice-Based Ring Signature for Message Authentication in VANETs

IEEE Systems Journal, 2020
In this article, we propose an efficient lattice-based ring signature scheme for message authentication in vehicular ad-hoc networks (VANETs). It provides unconditional identity privacy preservation, message authentication, and location privacy for the ...
Pravin Mundhe   +3 more
semanticscholar   +1 more source

Self-certified ring signatures

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
We present a new notion, Self-certified Ring Signature (SCRS), to provide an alternative solution to the certificate management problem in ring signatures and eliminate private key escrow problem in identity based ring signatures. Our scheme captures all features of ring signatures and exhibits the advantages such as low storage, communication and ...
Nan Li, Yi Mu, Willy Susilo, Fuchun Guo
openaire   +1 more source

Ring Group Signatures

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012
In many applications of group signatures, not only a signer's identity but also which group the signer belongs to is sensitive information regarding signer privacy. In this paper, we study these applications and combine a group signature with a ring signature to create a ring group signature, which specifies a set of possible groups without revealing ...
openaire   +1 more source

Nominative Proxy Ring Signature

2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, 2009
In a nominative proxy ring signature scheme, an original signer delegates his nominative signing power to some proxies forming a ring. The member of the ring can generate a nominative signature on behalf of the original signer and the ring. In a nominative proxy ring signature scheme, only the nominee can verify the ring signature and if necessary ...
Chengyu Hu, Pengtao Liu, Guoyan Zhang
openaire   +1 more source

A certificateless ring signature scheme with batch verification for applications in VANET

Journal of Information Security and Applications, 2020
One of the most important challenges in secure and efficient communications for Vehicular Ad hoc NETworks (VANET) is proposing an appropriate authentication scheme.
Samra Bouakkaz, F. Semchedine
semanticscholar   +1 more source

Relinkable Ring Signature

2009
In this paper, we propose the concept of a relinkable ring signature, which is a ring signature with ring reformation function, i.e., a signer can delegate ring reformation ability separately from signing ability to his/her proxy. The relinkable ring signature can be applicable to proxy ring reformation, anonymization of past-generated signature, or ...
Koutarou Suzuki   +2 more
openaire   +1 more source

Identity Based Threshold Ring Signature

2005
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n – t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks.
Yiu, SM, Chow, SSM, Hui, LCK
openaire   +2 more sources

Controllable Ring Signatures

2007
This paper introduces a new concept called controllable ring signature which is ring signature with additional properties as follow. (1) Anonymous identification: by an anonymous identification protocol, the real signer can anonymously prove his authorship of the ring signature to the verifier. And this proof is non-transferable. (2) Linkable signature:
Gao, Wei   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy