Results 41 to 50 of about 1,920,406 (199)
As illegal access control, privacy disclosure and other threats in vehicular ad-hoc networks become more prevalent, and the importance of safety and privacy protection in vehicular communications grows significantly.
Yi Han +5 more
doaj +1 more source
Efficient traceable ring signature scheme without pairings
Although currently several traceable (or linkable) ring signature schemes have been proposed, most of them are constructed on pairings. In this paper, we present an efficient traceable ring signature (TRS) scheme without pairings, which is based on the ...
Ke Gu, XinYing Dong, Linyu Wang
semanticscholar +1 more source
Threshold ring signature: generic construction and logarithmic size instantiation
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be verified, but the signer’s identity can only be traced to a limited set. The concept was further enhanced to
Huizhuo Wang, Yang Tao, Rui Zhang
doaj +1 more source
Selectively Linkable and Convertible Ring Signature Scheme Based on DLP [PDF]
Most of the existing linkable and convertible ring signature schemes do not have strong anonymity.To solve this problem,a ring signature scheme based on Discrete Logarithm Problem(DLP) is proposed.The actual signer establishes an association tag by ...
CAO Suzhen,SUN Han,DAI Wenjie,WANG Xiuya
doaj +1 more source
Designated verifier ring signature and ring signcryption
Ring signatures can achieve the anonymity of the users who want to sign documents not only in the authenticated way but also in the confidential way. Based on the k-CAA2 assumption, a security designated verifier ring signature scheme is proposed from bilinear pairing.
Xiaotong Fu, Wen Liu, Ruijun Shi
openaire +1 more source
The emergence of Wireless Body Area Networks (WBAN) provides users with ubiquitous wireless communication services, such as continuous exchange of medical information in real time.
Kaixin Zhao +3 more
semanticscholar +1 more source
Ring signatures are widely used in e-voting, anonymous whistle-blowing systems, and blockchain transactions. However, due to the anonymity of ring signatures, a signer can sign the same message multiple times, potentially leading to repeated voting or ...
Wen Gao +5 more
doaj +1 more source
: Amidst the rapid development of the Internet of Things (IoT), Vehicular Ad-Hoc NETwork (VANET), a typical IoT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives of individuals.
Jinhui Liu +6 more
semanticscholar +1 more source
A New Constant-Size Group Signature Scheme From Lattices
A lattice-based group signature scheme (LGSS) is an active cryptographic primitive, where each group member can sign messages anonymously in the name of the entire group and each valid signature should be traced to some group member on the lattice.
Qin Luo, Chun-Yang Jiang
doaj +1 more source
Practical periodic deniable signature scheme based on ISRSAC
In periodic deniable ring signature schemes, ring members have the ability to periodically confirm or deny their role as signers according to a protocol, without the need for third-party intervention—this is referred to as periodic deniable ring ...
Yanshuo Zhang +4 more
doaj +1 more source

