Results 121 to 130 of about 121,303 (160)
Some of the next articles are maybe not open access.
Threshold Ring Signatures with Accountability
Threshold ring signatures (TRS) allow several signers to sign the same message on behalf of a group. This scheme is fully anonymity in that a signature reveals the number of signers who created the signature but tells nothing about the identity of all signers who participated in generating the signature.Xuan Thanh Khuc +5 more
openaire +2 more sources
Threshold Ring Signature Scheme from Cryptographic Group Action
2023A threshold ring signature (t-out-of-N) is an extension of ring signatures that allow t users jointly sign a message on the behalf of N users, selected in an arbitrary manner, while keeping their identities anonymous. This paper presents a construction of threshold ring signature from cryptographic group action, based on the OR proof of group action ...
Pham, Minh Thuy Truc +3 more
openaire +2 more sources
An efficient code-based threshold ring signature scheme
Journal of Information Security and Applications, 2019Abstract Code based cryptography is a powerful and a promising alternative to the number theoretic cryptography as it is supposed to resist to the quantum computer. The migration to the post quantum hypothetical world requires the design of all the most important cryptographic primitives such as signature schemes.
Hafsa Assidi +2 more
openaire +1 more source
Provably Secure Code-Based Threshold Ring Signatures
2009A threshold ring signature scheme enables a set of users to sign a message such that a finite set of possible signers (the ring) is identified, without revealing which subset of ring members actually produced the signature. A recent proposal of Aguillar et al. introduced the first code-based threshold ring signature scheme which large signatures (about
Dallot, Léonard, Vergnaud, Damien
openaire +1 more source
A new identity-based threshold ring signature scheme
2011 IEEE International Conference on Systems, Man, and Cybernetics, 2011Aiming at the security problems existed in most identity-based threshold ring signature (ITRS) schemes, including poor security and inefficient in verifying, a new ITRS scheme is proposed. We significantly enhance the security of signature key by using bilinear pairings and secret sharing techniques.
Feng Xu, Xin Lv
openaire +1 more source
Improved Threshold Ring Signature for Ad-Hoc Group
2006 International Conference on Wireless Communications, Networking and Mobile Computing, 2006A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized, so some signature schemes had been introduced for the ad hoc group. On the basis of analyzing those schemes, we propose a threshold ring signature from bilinear pairings for ad ...
Junfang Xiao +3 more
openaire +1 more source
Threshold Ring Signature with Message Block Sharing
2019Lattices have attracted a great attention during recent years and many signature schemes have emerged based on lattices. In this paper we have proposed Threshold-Ring Signature K–out–of–Nscheme, here signature is generated by a subset of K signers from the N signers while maintaining the anonymity of these K signers using the Ring Signature by Wang et ...
Swati Rawal, Sahadeo Padhye
openaire +1 more source
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol
The Computer Journal, 2015In this paper, we point out some faulty instantiations of threshold ring signatures (TRS) based on the threshold proof-of-knowledge (TPoK) protocol. Although a TRS can be regarded as the non-interactive version of the TPoK, the computational domains of the variables should be carefully chosen.
Liu, Joseph K +5 more
openaire +2 more sources
Subliminal channels in the identity-based threshold ring signature
International Journal of Computer Mathematics, 2009Subliminal signature schemes enable senders to hide subliminal messages in a digital signature such that no one besides the authorised subliminal message receiver (called designated receiver) can extract subliminal messages from that signature. This paper is the first to construct subliminal channels on the identity-based threshold ring signature ...
Chao-Lin Yang +2 more
openaire +1 more source
A New Threshold Ring Signature for Ad-hoc Group
2007 Second International Conference on Communications and Networking in China, 2007A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized. Following this line, some signature schemes had introduced for ad hoc group. On the based of analyzing those scheme, we propose a threshold ring signature from bilinear pairings
Junfang Xiao, Guihua Zeng
openaire +1 more source

