Results 281 to 290 of about 2,245,906 (352)
Some of the next articles are maybe not open access.

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks

IEEE Transactions on Intelligent Vehicles, 2023
Vehicle-to-Grid (V2G) networks are potential solutions to addressing energy and environmental challenges, although security remains a key concern. For example, attackers may seek to obtain private information from frequent electricity/service exchanges ...
Yulin Liu   +5 more
semanticscholar   +3 more sources

Certificateless Threshold Ring Signature

Information Sciences, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang   +3 more
openaire   +4 more sources

RAT Ring: Event Driven Publish/Subscribe Communication Protocol for IIoT by Report and Traceable Ring Signature

IEEE Transactions on Industrial Informatics
The Industrial Internet of Things (IIoT) has been widely studied, which dramatically enhanced the manufacturing efficiency and service elasticity.
Gang Xu   +6 more
semanticscholar   +3 more sources

Anonymity-Enhanced Sequential Multi-Signer Ring Signature for Secure Medical Data Sharing in IoMT

IEEE Transactions on Information Forensics and Security
Internet of Medical Things (IoMT) has garnered significant research attention from both academic and medical institutions. However, the sensitive medical data involved in IoMT raises security and privacy concerns.
Gang Xu   +6 more
semanticscholar   +3 more sources

An efficient multivariate threshold ring signature scheme

Computer Standards and Interfaces, 2021
At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability 2 3 . Petzoldt et al.
D. Duong   +3 more
semanticscholar   +3 more sources

Revocable Ring Signature

Journal of Computer Science and Technology, 2007
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Ring signature, on the other hand, does not allow anyone to revoke the signer anonymity, while allowing the real signer to form a group ...
Liu, Dennis Y.W.   +4 more
openaire   +4 more sources

LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs

IEEE Transactions on Vehicular Technology
Vehicular ad-hoc networks (VANETs) have drawn a lot of attention for their potential to improve traffic efficiency and safety. To deal with anonymous authentication and message integrity during communication, many protocols have been designed.
Jiaming Wen   +5 more
semanticscholar   +3 more sources

Concise RingCT Protocol Based on Linkable Threshold Ring Signature

IEEE Transactions on Dependable and Secure Computing
Ring Confidential Transactions (RingCT) is a typical privacy-preserving protocol for blockchain, which is used for the most popular anonymous cryptocurrency Monero in recent years.
Junke Duan   +5 more
semanticscholar   +3 more sources

An efficient lattice-based linkable ring signature scheme with scalability to multiple layer

Journal of Ambient Intelligence and Humanized Computing, 2021
Yan Ren, Haipeng Guan, Qiuxia Zhao
semanticscholar   +3 more sources

Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing

IEEE Transactions on Cloud Computing, 2022
Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing.
Zhiwei Wang, Jiaxing Fan
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy