Results 41 to 50 of about 1,920,406 (199)

Improved Dual-Protected Ring Signature for Security and Privacy of Vehicular Communications in Vehicular Ad-Hoc Networks

open access: yesIEEE Access, 2018
As illegal access control, privacy disclosure and other threats in vehicular ad-hoc networks become more prevalent, and the importance of safety and privacy protection in vehicular communications grows significantly.
Yi Han   +5 more
doaj   +1 more source

Efficient traceable ring signature scheme without pairings

open access: yesAdvances in Mathematics of Communications, 2020
Although currently several traceable (or linkable) ring signature schemes have been proposed, most of them are constructed on pairings. In this paper, we present an efficient traceable ring signature (TRS) scheme without pairings, which is based on the ...
Ke Gu, XinYing Dong, Linyu Wang
semanticscholar   +1 more source

Threshold ring signature: generic construction and logarithmic size instantiation

open access: yesCybersecurity
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be verified, but the signer’s identity can only be traced to a limited set. The concept was further enhanced to
Huizhuo Wang, Yang Tao, Rui Zhang
doaj   +1 more source

Selectively Linkable and Convertible Ring Signature Scheme Based on DLP [PDF]

open access: yesJisuanji gongcheng, 2019
Most of the existing linkable and convertible ring signature schemes do not have strong anonymity.To solve this problem,a ring signature scheme based on Discrete Logarithm Problem(DLP) is proposed.The actual signer establishes an association tag by ...
CAO Suzhen,SUN Han,DAI Wenjie,WANG Xiuya
doaj   +1 more source

Designated verifier ring signature and ring signcryption

open access: yesInternational Journal of Intelligent Information and Database Systems, 2013
Ring signatures can achieve the anonymity of the users who want to sign documents not only in the authenticated way but also in the confidential way. Based on the k-CAA2 assumption, a security designated verifier ring signature scheme is proposed from bilinear pairing.
Xiaotong Fu, Wen Liu, Ruijun Shi
openaire   +1 more source

Public Auditing Scheme With Identity Privacy Preserving Based on Certificateless Ring Signature for Wireless Body Area Networks

open access: yesIEEE Access, 2020
The emergence of Wireless Body Area Networks (WBAN) provides users with ubiquitous wireless communication services, such as continuous exchange of medical information in real time.
Kaixin Zhao   +3 more
semanticscholar   +1 more source

Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions

open access: yesCryptography
Ring signatures are widely used in e-voting, anonymous whistle-blowing systems, and blockchain transactions. However, due to the anonymity of ring signatures, a signer can sign the same message multiple times, potentially leading to repeated voting or ...
Wen Gao   +5 more
doaj   +1 more source

Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks

open access: yesTsinghua Science and Technology, 2019
: Amidst the rapid development of the Internet of Things (IoT), Vehicular Ad-Hoc NETwork (VANET), a typical IoT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives of individuals.
Jinhui Liu   +6 more
semanticscholar   +1 more source

A New Constant-Size Group Signature Scheme From Lattices

open access: yesIEEE Access, 2020
A lattice-based group signature scheme (LGSS) is an active cryptographic primitive, where each group member can sign messages anonymously in the name of the entire group and each valid signature should be traced to some group member on the lattice.
Qin Luo, Chun-Yang Jiang
doaj   +1 more source

Practical periodic deniable signature scheme based on ISRSAC

open access: yesJournal of King Saud University: Computer and Information Sciences
In periodic deniable ring signature schemes, ring members have the ability to periodically confirm or deny their role as signers according to a protocol, without the need for third-party intervention—this is referred to as periodic deniable ring ...
Yanshuo Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy