Results 291 to 300 of about 2,245,906 (352)
Some of the next articles are maybe not open access.
A certificateless ring signature scheme based on lattice
Concurrency and Computation, 2022For the problems that ring signature needs key escrow, has some security risks, and cannot avoid malicious key generation center (KGC) in the post‐quantum era, we design a certificateless ring signature scheme based on lattice (L‐CRSS).
Songshou Dong +3 more
semanticscholar +1 more source
Journal of Electronics (China), 2008
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an ...
Baodian Wei +2 more
openaire +1 more source
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an ...
Baodian Wei +2 more
openaire +1 more source
IEEE Transactions on Dependable and Secure Computing, 2008
Ring signature was first introduced in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, she is unable to tell which member actually produced the signature.
J. Ren, L. Harn
openaire +1 more source
Ring signature was first introduced in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, she is unable to tell which member actually produced the signature.
J. Ren, L. Harn
openaire +1 more source
IEE Proceedings - Communications, 2005
A ring signature scheme enables a signer to produce a signature without revealing their identity. A verifier can verify that the ring signature was made by a ring member, but cannot identify the real signer. A convertible ring signature scheme is proposed that allows the real signer to convert a ring signature into an ordinary signature by revealing ...
K.-C. Lee, H.-A. Wen, T. Hwang
openaire +1 more source
A ring signature scheme enables a signer to produce a signature without revealing their identity. A verifier can verify that the ring signature was made by a ring member, but cannot identify the real signer. A convertible ring signature scheme is proposed that allows the real signer to convert a ring signature into an ordinary signature by revealing ...
K.-C. Lee, H.-A. Wen, T. Hwang
openaire +1 more source
A Ring Signature With Aggregation for Ensuring Privacy in Blockchain Transactions
IEEE Internet of Things JournalRing signatures are a crucial cryptographic tool underpinning blockchains and blockchain-based systems, and there are ongoing efforts to design different ring signatures to provide varying properties in a range of applications (e.g., batch verification ...
Xiaohui Tong +4 more
semanticscholar +1 more source
TRIFORS: LINKable Trilinear Forms Ring Signature
IACR Cryptology ePrint ArchiveWe present TRIFORS (TRIlinear FOrms Ring Signature), a logarithmic post-quantum (linkable) ring signature based on a novel assumption regarding equivalence of alternating trilinear forms.
Giuseppe D’Alconzo, Andrea Gangemi
semanticscholar +1 more source
Nominative Signature from Ring Signature
2007Since the introduction of nominative signature (NS) in 1996, there have been a handful of schemes proposed and almost all of them have been found flawed. The only one which is secure requires multiround of communications between the nominator and the nominee for signature generation. In this paper, we propose a novel construction which is efficient and
Dennis Y. W. Liu +3 more
openaire +1 more source
Signatures and Semi Signatures of Abstract Witt Rings and Witt Rings of Semilocal Rings
Canadian Journal of Mathematics, 1978This paper originated in an attempt to carry over the results of [3] from the case of a field of characteristic different from two to that of semilocal rings. To carry this out, we reverse the point of view of [3] and do assume a full knowledge of the theory of Witt rings of classes of nondegenerate symmetric bilinear forms over semilocal rings as ...
Kleinstein, Jerrold L., Rosenberg, Alex
openaire +1 more source
Confessible Threshold Ring Signatures
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006We present two threshold ring signature schemes with different properties. One focuses on the confessibility (or signer verifiability) and the denouncibility properties. The other focuses on the threshold-confessibility. Our schemes are built on generic ring signature schemes and can be easily adapted to most existing ring signature schemes.
Yu-shian Chen +3 more
openaire +1 more source
IEEE Transactions on Information Forensics and Security
Ring signatures have been extensively researched for Cloud-assisted Electronic Medical Records (EMRs) sharing, aiming to address the challenge of “medical information silos” while safeguarding the privacy of patients’ personal information and the ...
Xue Chen +5 more
semanticscholar +1 more source
Ring signatures have been extensively researched for Cloud-assisted Electronic Medical Records (EMRs) sharing, aiming to address the challenge of “medical information silos” while safeguarding the privacy of patients’ personal information and the ...
Xue Chen +5 more
semanticscholar +1 more source

