Results 131 to 140 of about 121,303 (160)
Some of the next articles are maybe not open access.
A New Multivariate Based Threshold Ring Signature Scheme
2014In CRYPTO 2011, Sakumoto et al. presented a 3-pass identification protocol whose security is solely based on the MQ problem. This identification protocol was extended to a threshold ring signature scheme by Petzoldt et al. via Fiat-Shamir transformation in AAECC 2013.
Jingwan Zhang, Yiming Zhao
openaire +1 more source
Extendable Threshold Ring Signatures with Enhanced Anonymity
2023Avitabile, Gennaro +2 more
openaire +1 more source
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register
2007For many practical usages or resource-limited environments, it is often desirable to speed up the cryptographic systems without any security lost. Linkable ring signature is a kind of signatures which can simultaneously provide the properties of anonymity, spontaneity as well as linkability.
Xiangxue Li, Dong Zheng, Kefei Chen
openaire +1 more source
On the Security Models of (Threshold) Ring Signature Schemes
2005We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. [1] and Abe et al. [1]. They offer different levels of security.
Joseph K. Liu, Duncan S. Wong
openaire +1 more source
Catalytic Enantioselective Ring-Opening Reactions of Cyclopropanes
Chemical Reviews, 2021Vincent Pirenne +2 more
exaly
C–C Bond Cleavages of Cyclopropenes: Operating for Selective Ring-Opening Reactions
Chemical Reviews, 2021Ruben Vicente
exaly
Identity-based threshold ring signature scheme with constant signature size
Journal of Computer Applications, 2013Hua SUN +3 more
openaire +1 more source
Signer revocability for threshold ring signatures
Computer Standards & InterfacesDa Teng, Yanqing Yao
openaire +1 more source

