Results 31 to 40 of about 1,920,406 (199)
Using Ring Learning with Errors Problem to Construct Linkable Ring Signature Scheme
In order to solve the problem of large key size and low efficiency in the linkable ring signature scheme on lattice, this paper reconstructs the linkable ring signature scheme from lattice based on the ring learning with errors (RLWE) problem, according ...
YE Qing, WANG Wenbo, LI Yingying, QIN Panke, ZHAO Zongqu, WANG Yongjun
doaj +1 more source
Fail-Stop Ring Signature Scheme Based on Certificateless Cryptosystem [PDF]
Fail-stop group signature schemes can prevent opponents with strong compute power from counterfeiting signatures,and thereby implement privacy protection for users.On the basis of the fail-stop group signature scheme,this paper designs a fail-stop ring ...
ZHANG Yulei, SONG Tingting, ZHANG Yongjie, WANG Caifen
doaj +1 more source
Ring Signatures: Universally Composable Definitions and Constructions
Though anonymity of ring signature schemes has been studied in many literatures for a long time, these papers showed different definitions and there is no consensus. Recently, Bender et al. proposed two new anonymity definitions of ring signature which is stronger than the traditional definition, that are called anonymity against attribution attacks ...
Kazuki Yoneyama, Kazuo Ohta
openaire +2 more sources
Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf of the ring without revealing the signer’s identity. Whistle-blowers especially find this useful.
Geontae Noh, Ji Young Chun, Ik Rae Jeong
doaj +1 more source
ID-based ring signature on prime order group from asymmetric pairing
For the problem that the security proof was difficult to be realized under the standard model in the existing ID-based ring signature schemes, an ID-based ring signature scheme proven secure in the standard model was proposed.Firstly, the formal ...
Hongxia HOU +3 more
doaj +2 more sources
Certificateless Network Coding Ring Signature Scheme
Traditional certificateless ring signature is not suitable for the network coding environment. In this view, a new certificateless network coding ring signature (CL-NCRS) is devised by using the techniques of multisource network coding and ...
Hui-fang Yu, Weike Wang
semanticscholar +1 more source
Secure Threshold Ring Signature Based on SM9
Nowadays, it becomes a major issue that has become increasingly prominent to ensure the privacy and security of information. With the wide application of SM9 algorithm in various fields, it is particularly important to improve the security of SM9 ...
Shuanggen Liu +3 more
doaj +1 more source
Efficient Linkable Ring Signature Scheme [PDF]
A linkable ring signature, which is a special type of ring signature, can aid in verifying whether two signatures have been signed by the same user, without compromising anonymity. This feature enables it to play an important role in blockchains. However,
ZHAO Jiangdong, CHEN Hu, WANG Xiaoyi
doaj +1 more source
A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme
In this article, we give a digital signature by using Lindner–Peikert cryptosystem. The security of this digital signature is based on the assumptions about hardness of Ring-LWE and Ring-SIS problems, along with providing public key and signature of ...
Sharafi Javad, Daghigh Hassan
doaj +1 more source
Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes
A blind signature enables a user to obtain signatures on any message from an authority who cannot acquire any information on the message being signed. A blind ring signature scheme is designed as a ring signature scheme with the blindness property.
Kyung-Ah Shim, Youngjoo An
doaj +1 more source

