Results 141 to 150 of about 1,920,406 (199)
Some of the next articles are maybe not open access.
Ring Signature Based on ElGamal Signature
2006Ring signature was first introduced by Rivest, Shamir and Tanman in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, he is unable to tell which member actually ...
Jian Ren, Lein Harn
openaire +1 more source
2008
We propose a version of ring signatures for which the set of potential signers may be reduced: the real signer can prove that he or she has created the signature, while every other member of the ring can prove not to be the signer. Possibility to run these protocols is triggered by publishing certain secret information.
Marek Klonowski +3 more
openaire +1 more source
We propose a version of ring signatures for which the set of potential signers may be reduced: the real signer can prove that he or she has created the signature, while every other member of the ring can prove not to be the signer. Possibility to run these protocols is triggered by publishing certain secret information.
Marek Klonowski +3 more
openaire +1 more source
Toward the Fair Anonymous Signatures: Deniable Ring Signatures
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006Ring signature scheme, proposed by Rivest et al., allows a signer to sign a message anonymously. In the ring signature scheme, the signer who wants to sign a document anonymously first chooses some public keys of entities (signers) and then generates a signature which ensures that one of the signer or entities signs the document.
Y. KOMANO +3 more
openaire +1 more source
Ring Selection for Ring Signature-Based Privacy Protection in VANETs
ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 2020Many cryptography techniques have been used to protect the privacy of vehicular ad hoc networks(VANETs). For example, the ring signature, one of the anonymous techniques by virtue of its unconditional anonymity, is widely used in VANETs for privacy ...
Ling-ling Wang +3 more
semanticscholar +1 more source
Threshold Discernible Ring Signatures
2012A ring signature [1] demonstrates that the signer who produced it is among a group A of n people, called a ring. A signer may produce a ring signature on any ring A he is part of, arbitrarily without any setup procedure or the consent of anyone in A. Several extensions of ring signatures have been proposed in literature.
Swarun Kumar +4 more
openaire +1 more source
Leakage-resilient ring signature schemes
Theoretical Computer Science, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jianye Huang, Qiong Huang, Willy Susilo
openaire +3 more sources
Practical Constant-Size Ring Signature
Journal of Computer Science and Technology, 2018Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and privacy has been one of the main concerns in the system similar to Bitcoin. Ring signature is a good method for those users who
Meng-Jun Qin, Yun-Lei Zhao, Zhou-Jun Ma
openaire +1 more source
Symbolic Models of Group Signatures and Ring Signatures
2023Security protocols play an integral role in contemporary society, serving as fundamental mechanisms for ensuring secure internet access and facilitating communication through instant messaging applications. Given the prevalence of security protocols, an important area of research involves the formal verification of these protocols with regard to their ...
openaire +1 more source
Identity verifiable ring signature scheme for privacy protection in blockchain
International journal of information technology, 2023S. Devidas, N. R. Rekha, Y. S. Subba Rao
semanticscholar +1 more source
Unconditionally Anonymous Ring and Mesh Signatures
Journal of Cryptology, 2015zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +2 more sources

