Results 141 to 150 of about 1,920,406 (199)
Some of the next articles are maybe not open access.

Ring Signature Based on ElGamal Signature

2006
Ring signature was first introduced by Rivest, Shamir and Tanman in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, he is unable to tell which member actually ...
Jian Ren, Lein Harn
openaire   +1 more source

Step-Out Ring Signatures

2008
We propose a version of ring signatures for which the set of potential signers may be reduced: the real signer can prove that he or she has created the signature, while every other member of the ring can prove not to be the signer. Possibility to run these protocols is triggered by publishing certain secret information.
Marek Klonowski   +3 more
openaire   +1 more source

Toward the Fair Anonymous Signatures: Deniable Ring Signatures

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006
Ring signature scheme, proposed by Rivest et al., allows a signer to sign a message anonymously. In the ring signature scheme, the signer who wants to sign a document anonymously first chooses some public keys of entities (signers) and then generates a signature which ensures that one of the signer or entities signs the document.
Y. KOMANO   +3 more
openaire   +1 more source

Ring Selection for Ring Signature-Based Privacy Protection in VANETs

ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 2020
Many cryptography techniques have been used to protect the privacy of vehicular ad hoc networks(VANETs). For example, the ring signature, one of the anonymous techniques by virtue of its unconditional anonymity, is widely used in VANETs for privacy ...
Ling-ling Wang   +3 more
semanticscholar   +1 more source

Threshold Discernible Ring Signatures

2012
A ring signature [1] demonstrates that the signer who produced it is among a group A of n people, called a ring. A signer may produce a ring signature on any ring A he is part of, arbitrarily without any setup procedure or the consent of anyone in A. Several extensions of ring signatures have been proposed in literature.
Swarun Kumar   +4 more
openaire   +1 more source

Leakage-resilient ring signature schemes

Theoretical Computer Science, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jianye Huang, Qiong Huang, Willy Susilo
openaire   +3 more sources

Practical Constant-Size Ring Signature

Journal of Computer Science and Technology, 2018
Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and privacy has been one of the main concerns in the system similar to Bitcoin. Ring signature is a good method for those users who
Meng-Jun Qin, Yun-Lei Zhao, Zhou-Jun Ma
openaire   +1 more source

Symbolic Models of Group Signatures and Ring Signatures

2023
Security protocols play an integral role in contemporary society, serving as fundamental mechanisms for ensuring secure internet access and facilitating communication through instant messaging applications. Given the prevalence of security protocols, an important area of research involves the formal verification of these protocols with regard to their ...
openaire   +1 more source

Identity verifiable ring signature scheme for privacy protection in blockchain

International journal of information technology, 2023
S. Devidas, N. R. Rekha, Y. S. Subba Rao
semanticscholar   +1 more source

Unconditionally Anonymous Ring and Mesh Signatures

Journal of Cryptology, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +2 more sources

Home - About - Disclaimer - Privacy