Results 121 to 130 of about 121,303 (160)
Some of the next articles are maybe not open access.

Threshold Ring Signatures with Accountability

Threshold ring signatures (TRS) allow several signers to sign the same message on behalf of a group. This scheme is fully anonymity in that a signature reveals the number of signers who created the signature but tells nothing about the identity of all signers who participated in generating the signature.
Xuan Thanh Khuc   +5 more
openaire   +2 more sources

Threshold Ring Signature Scheme from Cryptographic Group Action

2023
A threshold ring signature (t-out-of-N) is an extension of ring signatures that allow t users jointly sign a message on the behalf of N users, selected in an arbitrary manner, while keeping their identities anonymous. This paper presents a construction of threshold ring signature from cryptographic group action, based on the OR proof of group action ...
Pham, Minh Thuy Truc   +3 more
openaire   +2 more sources

An efficient code-based threshold ring signature scheme

Journal of Information Security and Applications, 2019
Abstract Code based cryptography is a powerful and a promising alternative to the number theoretic cryptography as it is supposed to resist to the quantum computer. The migration to the post quantum hypothetical world requires the design of all the most important cryptographic primitives such as signature schemes.
Hafsa Assidi   +2 more
openaire   +1 more source

Provably Secure Code-Based Threshold Ring Signatures

2009
A threshold ring signature scheme enables a set of users to sign a message such that a finite set of possible signers (the ring) is identified, without revealing which subset of ring members actually produced the signature. A recent proposal of Aguillar et al. introduced the first code-based threshold ring signature scheme which large signatures (about
Dallot, Léonard, Vergnaud, Damien
openaire   +1 more source

A new identity-based threshold ring signature scheme

2011 IEEE International Conference on Systems, Man, and Cybernetics, 2011
Aiming at the security problems existed in most identity-based threshold ring signature (ITRS) schemes, including poor security and inefficient in verifying, a new ITRS scheme is proposed. We significantly enhance the security of signature key by using bilinear pairings and secret sharing techniques.
Feng Xu, Xin Lv
openaire   +1 more source

Improved Threshold Ring Signature for Ad-Hoc Group

2006 International Conference on Wireless Communications, Networking and Mobile Computing, 2006
A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized, so some signature schemes had been introduced for the ad hoc group. On the basis of analyzing those schemes, we propose a threshold ring signature from bilinear pairings for ad ...
Junfang Xiao   +3 more
openaire   +1 more source

Threshold Ring Signature with Message Block Sharing

2019
Lattices have attracted a great attention during recent years and many signature schemes have emerged based on lattices. In this paper we have proposed Threshold-Ring Signature K–out–of–Nscheme, here signature is generated by a subset of K signers from the N signers while maintaining the anonymity of these K signers using the Ring Signature by Wang et ...
Swati Rawal, Sahadeo Padhye
openaire   +1 more source

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol

The Computer Journal, 2015
In this paper, we point out some faulty instantiations of threshold ring signatures (TRS) based on the threshold proof-of-knowledge (TPoK) protocol. Although a TRS can be regarded as the non-interactive version of the TPoK, the computational domains of the variables should be carefully chosen.
Liu, Joseph K   +5 more
openaire   +2 more sources

Subliminal channels in the identity-based threshold ring signature

International Journal of Computer Mathematics, 2009
Subliminal signature schemes enable senders to hide subliminal messages in a digital signature such that no one besides the authorised subliminal message receiver (called designated receiver) can extract subliminal messages from that signature. This paper is the first to construct subliminal channels on the identity-based threshold ring signature ...
Chao-Lin Yang   +2 more
openaire   +1 more source

A New Threshold Ring Signature for Ad-hoc Group

2007 Second International Conference on Communications and Networking in China, 2007
A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized. Following this line, some signature schemes had introduced for ad hoc group. On the based of analyzing those scheme, we propose a threshold ring signature from bilinear pairings
Junfang Xiao, Guihua Zeng
openaire   +1 more source

Home - About - Disclaimer - Privacy