Results 51 to 60 of about 1,920,406 (199)

Privacy in wireless sensor networks using ring signature

open access: yesJournal of King Saud University: Computer and Information Sciences, 2014
The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node.
Ashmita Debnath   +2 more
doaj   +1 more source

Efficient proxy ring signature for VANET

open access: yesThe Journal of Engineering, 2019
The messages in vehicular ad hoc networks (VANET) are vulnerable to attack in the open wireless environment. Group communication in VANET is receiving more attention, which confronts many security issues.
Lianhai Liu   +4 more
doaj   +1 more source

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings

open access: yes, 2005
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al. was based on RSA cryptosystem and certificate based public key setting.
Lal, Sunder, Awasthi, Amit
openaire   +2 more sources

Ring adaptor signature scheme based on SM2 digital signature algorithm

open access: yes网络与信息安全学报
Adaptor signature can guarantee the atomicity of cross-chain transactions without relying on trusted third parties, but most adaptor signature algorithms fail to protect the privacy of user identities.
Xu Xinyue   +5 more
doaj  

Optimizing signature space performance in privacy-enhanced blockchains: novel ring signature solutions

open access: yesEURASIP Journal on Information Security
In blockchain applications, ring signatures offer significant advantages, particularly in decentralized settings, safeguarding user privacy and data security.
Da Teng, Yanqing Yao, Chao Huang
doaj   +1 more source

Ring Signature Scheme Based on Domestic Cryptographic Algorithm SM9 [PDF]

open access: yesJisuanji kexue
Ring signatures possess spontaneity and anonymity,which can protect user privacy while implementing digital signatures.They have been widely used in scenarios requiring the concealment of the signer’s true identity,such as blockchain,electronic voting ...
XIE Zhenjie, ZHANG Yao, YANG Qichao, SONG Enzhou
doaj   +1 more source

Property-Based Anonymous Attestation in Trusted Cloud Computing

open access: yesJournal of Electrical and Computer Engineering, 2014
In the remote attestation on Trusted Computer (TC) computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed.
Zhen-Hu Ning   +3 more
doaj   +1 more source

Efficient Identity Based Ring Signature [PDF]

open access: yes, 2005
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates and the need for registering for a certificate before getting the public key. These two features are desirable especially for the efficiency and the real spontaneity of ring signature, where a user can anonymously sign a message on behalf of a group of ...
Sherman S. M. Chow   +2 more
openaire   +1 more source

Identity-based Linkable Ring Signcryption on NTRU Lattice [PDF]

open access: yesJisuanji kexue
Although the current lattice-based ring signcryption scheme resists quantum attacks,it has large key storage and high encryption/decryption time.The linkable lattice ring signcryption scheme not only can protect signer anonymity,but also can determine ...
TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J
doaj   +1 more source

Identity-based ring signature scheme under standard model

open access: yesTongxin xuebao, 2008
An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption.
ZHANG Yue-yu, LI Hui, WANG Yu-min
doaj   +2 more sources

Home - About - Disclaimer - Privacy