Results 21 to 30 of about 2,245,906 (352)

Representative Ring Signature Algorithm Based on Smart Contract [PDF]

open access: yesSensors, 2022
Traditional ring signature algorithms suffer from large signature data capacity and low speed of signature and verification during collective signing. In this work, we propose a representative ring signature algorithm based on smart contracts.
Qiude Li   +4 more
doaj   +2 more sources

A Novel Linkable Ring Signature on Ideal Lattices [PDF]

open access: yesEntropy, 2023
In this paper, a novel linkable ring signature scheme is constructed. The hash value of the public key in the ring and the signer’s private key are based on random numbers.
Chengtang Cao, Lin You, Gengran Hu
doaj   +2 more sources

A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity [PDF]

open access: goldCryptography, 2022
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability.
Maharage Nisansala Sevwandi Perera   +5 more
doaj   +2 more sources

Unconditionally Anonymous Ring and Mesh Signatures [PDF]

open access: bronzeJournal of Cryptology, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xavier Boyen
openalex   +3 more sources

Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations [PDF]

open access: yesEntropy
Linkable ring signatures are a type of ring signature scheme that can protect the anonymity of signers while allowing the public to verify whether the same signer has signed the same message multiple times.
Minghui Zheng   +5 more
doaj   +2 more sources

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings [PDF]

open access: yes, 2004
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al.
Awasthi, Amit K, Lal, Sunder
core   +3 more sources

Deniable ring signature scheme based on the ISRSAC digital signature algorithm [PDF]

open access: yesPeerJ Computer Science
This article introduces a deniable ring signature scheme within the framework of a ring signature protocol, which allows a member of the ring to assert or deny their role as the signature’s originator without the involvement of a trusted third party ...
Yanshuo Zhang   +4 more
doaj   +3 more sources

Secure Threshold Ring Signature Based on SM9 [PDF]

open access: goldIEEE Access, 2021
Nowadays, it becomes a major issue that has become increasingly prominent to ensure the privacy and security of information. With the wide application of SM9 algorithm in various fields, it is particularly important to improve the security of SM9 ...
Shuanggen Liu   +3 more
doaj   +2 more sources

Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes [PDF]

open access: goldIEEE Access, 2021
A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is designed as a ring signature scheme with the blindness property.
Kyung-Ah Shim, Youngjoo An
doaj   +2 more sources

Certificateless Linkable Ring Signature Scheme

open access: yesIEEE Access, 2020
Ring signature is an anonymous signature that both authenticates the message and protects the identity information of the signer. It is suitable for scenarios such as anonymous network access, online auctions, etc.
Lunzhi Deng, Hongyu Shi, Yan Gao
doaj   +2 more sources

Home - About - Disclaimer - Privacy