Results 311 to 320 of about 2,245,906 (352)
Some of the next articles are maybe not open access.

Toward the Fair Anonymous Signatures: Deniable Ring Signatures

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006
Ring signature scheme, proposed by Rivest et al., allows a signer to sign a message anonymously. In the ring signature scheme, the signer who wants to sign a document anonymously first chooses some public keys of entities (signers) and then generates a signature which ensures that one of the signer or entities signs the document.
Y. KOMANO   +3 more
openaire   +1 more source

Ring Selection for Ring Signature-Based Privacy Protection in VANETs

ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 2020
Many cryptography techniques have been used to protect the privacy of vehicular ad hoc networks(VANETs). For example, the ring signature, one of the anonymous techniques by virtue of its unconditional anonymity, is widely used in VANETs for privacy ...
Ling-ling Wang   +3 more
semanticscholar   +1 more source

Threshold Discernible Ring Signatures

2012
A ring signature [1] demonstrates that the signer who produced it is among a group A of n people, called a ring. A signer may produce a ring signature on any ring A he is part of, arbitrarily without any setup procedure or the consent of anyone in A. Several extensions of ring signatures have been proposed in literature.
Swarun Kumar   +4 more
openaire   +1 more source

Leakage-resilient ring signature schemes

Theoretical Computer Science, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jianye Huang, Qiong Huang, Willy Susilo
openaire   +3 more sources

Practical Constant-Size Ring Signature

Journal of Computer Science and Technology, 2018
Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and privacy has been one of the main concerns in the system similar to Bitcoin. Ring signature is a good method for those users who
Meng-Jun Qin, Yun-Lei Zhao, Zhou-Jun Ma
openaire   +1 more source

Symbolic Models of Group Signatures and Ring Signatures

2023
Security protocols play an integral role in contemporary society, serving as fundamental mechanisms for ensuring secure internet access and facilitating communication through instant messaging applications. Given the prevalence of security protocols, an important area of research involves the formal verification of these protocols with regard to their ...
openaire   +1 more source

Identity verifiable ring signature scheme for privacy protection in blockchain

International journal of information technology, 2023
S. Devidas, N. R. Rekha, Y. S. Subba Rao
semanticscholar   +1 more source

Semi-quantum ring signature protocol based on multi-particle GHZ state

Quantum Information Processing, 2023
Run-Ze He   +4 more
semanticscholar   +1 more source

Secure medical data sharing scheme based on traceable ring signature and blockchain

Peer-to-Peer Networking and Applications, 2022
Chengzhe Lai   +3 more
semanticscholar   +1 more source

A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids

Wireless personal communications, 2022
Huiwen Wang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy