Results 11 to 20 of about 1,920,406 (199)
Identity-Based Linkable Ring Signature Scheme
A ring signature is an anonymous signature that implements both the authentication of the message and the anonymity of the signer. In a “normal” ring signature scheme, the same signer can generate multiple ring signatures, but the verifier ...
Lunzhi Deng, Yuhong Jiang, Bingqin Ning
doaj +2 more sources
Certificateless Linkable Ring Signature Scheme
Ring signature is an anonymous signature that both authenticates the message and protects the identity information of the signer. It is suitable for scenarios such as anonymous network access, online auctions, etc.
Lunzhi Deng, Hongyu Shi, Yan Gao
doaj +2 more sources
The achievements of ring signature and its applications were surveyed.The majority of the schemes were generalized.The advantages and disadvantages of these schemes were analyzed.Some problems in the study of this field were presented,and several main ...
ZHANG Guo-yin +2 more
doaj +3 more sources
Ring signatures allow members of a group (called ring) to sign a message anonymously within the group, which is chosen ad hoc at the time of signing (the members do not need to have interacted before). In this paper, we propose a physical version of ring signatures.
Xavier Bultel
openaire +4 more sources
Research Progress and Prospect of Ring Signatures [PDF]
As a special group signature, ring signature has been widely used in anonymous voting, anonymous deposit and anonymous transaction because it can not only complete the signature without the cooperation of ring members, but also ensure the anonymity of ...
XIE Jia, LIU Shizhao, WANG Lu, GAO Juntao, WANG Baocang
doaj +1 more source
Secure E-Voting Protocol Based on SM9 Blind Signature and Ring Signature [PDF]
To solve the problems of anonymity,public verifiability,ballot collision,and forgery in the process of e-voting,an anonymous public verifiable e-voting system protocol design scheme is proposed based on SM9 algorithm.This scheme constructs an identity ...
RAO Jintao, CUI Zhe
doaj +1 more source
Ring Signature Scheme of Programmable Hash Function on Lattices [PDF]
To address the problem that the length of signature and key is too long in traditional ring signature schemes on lattices,this paper proposes an improved ring signature model of Programmable Hash Function(PHF) on lattices.The MP12 trapdoor function is ...
GE Binghui, ZHAO Zongqu, HE Zheng, QIN Panke
doaj +1 more source
Lattice-Based Logarithmic-Size Non-Interactive Deniable Ring Signatures
Deniable ring signature can be regarded as group signature without group manager, in which a singer is capable of singing a message anonymously, but, if necessary, each ring member is allowed to confirm or disavowal its involvement in the signature via ...
Huiwen Jia, Chunming Tang, Yanhua Zhang
doaj +1 more source
Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs
Vehicular ad hoc networks (VANETs) is the hotspot research field of wireless mobile ad hoc network, it provides a new opportunity to create a safe and efficient transportation environment.
Xiaohong Zhang +2 more
semanticscholar +1 more source
An Improved Scheme for PBFT Blockchain Consensus Algorithm Based on Ring Signature [PDF]
The alliance chain is a kind of blockchain that allows authorized nodes to join in the network.However,when the network condition is poor,the nodes will join and exit dynamically.Therefore,on the basis of ring signature theory,ElGamal digital signature ...
FANG Yi, DENG Jianqiu, CONG Linhu, LIU Chongyi
doaj +1 more source

