Results 21 to 30 of about 2,245,906 (352)
Representative Ring Signature Algorithm Based on Smart Contract [PDF]
Traditional ring signature algorithms suffer from large signature data capacity and low speed of signature and verification during collective signing. In this work, we propose a representative ring signature algorithm based on smart contracts.
Qiude Li +4 more
doaj +2 more sources
A Novel Linkable Ring Signature on Ideal Lattices [PDF]
In this paper, a novel linkable ring signature scheme is constructed. The hash value of the public key in the ring and the signer’s private key are based on random numbers.
Chengtang Cao, Lin You, Gengran Hu
doaj +2 more sources
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity [PDF]
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.
Maharage Nisansala Sevwandi Perera +5 more
doaj +2 more sources
Unconditionally Anonymous Ring and Mesh Signatures [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xavier Boyen
openalex +3 more sources
Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations [PDF]
Linkable ring signatures are a type of ring signature scheme that can protect the anonymity of signers while allowing the public to verify whether the same signer has signed the same message multiple times.
Minghui Zheng +5 more
doaj +2 more sources
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core +3 more sources
Deniable ring signature scheme based on the ISRSAC digital signature algorithm [PDF]
This article introduces a deniable ring signature scheme within the framework of a ring signature protocol, which allows a member of the ring to assert or deny their role as the signature’s originator without the involvement of a trusted third party ...
Yanshuo Zhang +4 more
doaj +3 more sources
Secure Threshold Ring Signature Based on SM9 [PDF]
Nowadays, it becomes a major issue that has become increasingly prominent to ensure the privacy and security of information. With the wide application of SM9 algorithm in various fields, it is particularly important to improve the security of SM9 ...
Shuanggen Liu +3 more
doaj +2 more sources
Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes [PDF]
A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is designed as a ring signature scheme with the blindness property.
Kyung-Ah Shim, Youngjoo An
doaj +2 more sources
Certificateless Linkable Ring Signature Scheme
Ring signature is an anonymous signature that both authenticates the message and protects the identity information of the signer. It is suitable for scenarios such as anonymous network access, online auctions, etc.
Lunzhi Deng, Hongyu Shi, Yan Gao
doaj +2 more sources

