Results 311 to 320 of about 2,245,906 (352)
Some of the next articles are maybe not open access.
Toward the Fair Anonymous Signatures: Deniable Ring Signatures
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006Ring signature scheme, proposed by Rivest et al., allows a signer to sign a message anonymously. In the ring signature scheme, the signer who wants to sign a document anonymously first chooses some public keys of entities (signers) and then generates a signature which ensures that one of the signer or entities signs the document.
Y. KOMANO +3 more
openaire +1 more source
Ring Selection for Ring Signature-Based Privacy Protection in VANETs
ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 2020Many cryptography techniques have been used to protect the privacy of vehicular ad hoc networks(VANETs). For example, the ring signature, one of the anonymous techniques by virtue of its unconditional anonymity, is widely used in VANETs for privacy ...
Ling-ling Wang +3 more
semanticscholar +1 more source
Threshold Discernible Ring Signatures
2012A ring signature [1] demonstrates that the signer who produced it is among a group A of n people, called a ring. A signer may produce a ring signature on any ring A he is part of, arbitrarily without any setup procedure or the consent of anyone in A. Several extensions of ring signatures have been proposed in literature.
Swarun Kumar +4 more
openaire +1 more source
Leakage-resilient ring signature schemes
Theoretical Computer Science, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jianye Huang, Qiong Huang, Willy Susilo
openaire +3 more sources
Practical Constant-Size Ring Signature
Journal of Computer Science and Technology, 2018Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and privacy has been one of the main concerns in the system similar to Bitcoin. Ring signature is a good method for those users who
Meng-Jun Qin, Yun-Lei Zhao, Zhou-Jun Ma
openaire +1 more source
Symbolic Models of Group Signatures and Ring Signatures
2023Security protocols play an integral role in contemporary society, serving as fundamental mechanisms for ensuring secure internet access and facilitating communication through instant messaging applications. Given the prevalence of security protocols, an important area of research involves the formal verification of these protocols with regard to their ...
openaire +1 more source
Identity verifiable ring signature scheme for privacy protection in blockchain
International journal of information technology, 2023S. Devidas, N. R. Rekha, Y. S. Subba Rao
semanticscholar +1 more source
Semi-quantum ring signature protocol based on multi-particle GHZ state
Quantum Information Processing, 2023Run-Ze He +4 more
semanticscholar +1 more source
Secure medical data sharing scheme based on traceable ring signature and blockchain
Peer-to-Peer Networking and Applications, 2022Chengzhe Lai +3 more
semanticscholar +1 more source
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids
Wireless personal communications, 2022Huiwen Wang +4 more
semanticscholar +1 more source

