Results 221 to 230 of about 121,764 (250)
Some of the next articles are maybe not open access.

A Separable Threshold Ring Signature Scheme

2004
We present a threshold ring signature scheme (spontaneous anonymous threshold signature scheme) that allows the use of both RSA-based and DL-based public keys at the same time. More generally, the scheme supports the mixture of public keys for any trapdoor-one-way type as well as three-move type signature schemes. This kind of ‘separability’ has useful
Joseph K. Liu   +2 more
openaire   +1 more source

Identity Based Threshold Ring Signature from Lattices

2014
In the graded encoding systems that can be used to construct multilinear maps, the graded Computational Deffie-Hellman problem gGCDHP problem is assumed to be hard. We present an equivalent problem, called the variant graded Computational Deffie-Hellman problem vGCDHP, and make generalization to get the general graded Computational Deffie-Hellman ...
Baodian Wei   +5 more
openaire   +1 more source

A Novel Lattice-Based Threshold Ring Signature Scheme

2020 5th International Conference on Computer Science and Engineering (UBMK), 2020
In this paper, we present a new TRSS (threshold ring signature scheme) which depends on the worst-case hardness of a lattice problem. We apply Fiat-Shamir transform to a lattice-based identification scheme to obtain the proposed scheme. The hardness of the identification scheme which is the hybrid combination of two different designs is based on ...
Sedat Akleylek, Meryem Soysaldi
openaire   +1 more source

Concise RingCT Protocol Based on Linkable Threshold Ring Signature

IEEE Transactions on Dependable and Secure Computing
Junke Duan   +5 more
openaire   +3 more sources

Threshold Ring Signatures with Accountability

Threshold ring signatures (TRS) allow several signers to sign the same message on behalf of a group. This scheme is fully anonymity in that a signature reveals the number of signers who created the signature but tells nothing about the identity of all signers who participated in generating the signature.
Xuan Thanh Khuc   +5 more
openaire   +2 more sources

Provably Secure Code-Based Threshold Ring Signatures

2009
A threshold ring signature scheme enables a set of users to sign a message such that a finite set of possible signers (the ring) is identified, without revealing which subset of ring members actually produced the signature. A recent proposal of Aguillar et al. introduced the first code-based threshold ring signature scheme which large signatures (about
Dallot, Léonard, Vergnaud, Damien
openaire   +1 more source

A new identity-based threshold ring signature scheme

2011 IEEE International Conference on Systems, Man, and Cybernetics, 2011
Aiming at the security problems existed in most identity-based threshold ring signature (ITRS) schemes, including poor security and inefficient in verifying, a new ITRS scheme is proposed. We significantly enhance the security of signature key by using bilinear pairings and secret sharing techniques.
Feng Xu, Xin Lv
openaire   +1 more source

Improved Threshold Ring Signature for Ad-Hoc Group

2006 International Conference on Wireless Communications, Networking and Mobile Computing, 2006
A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized, so some signature schemes had been introduced for the ad hoc group. On the basis of analyzing those schemes, we propose a threshold ring signature from bilinear pairings for ad ...
Junfang Xiao   +3 more
openaire   +1 more source

Threshold Ring Signature with Message Block Sharing

2019
Lattices have attracted a great attention during recent years and many signature schemes have emerged based on lattices. In this paper we have proposed Threshold-Ring Signature K–out–of–Nscheme, here signature is generated by a subset of K signers from the N signers while maintaining the anonymity of these K signers using the Ring Signature by Wang et ...
Swati Rawal, Sahadeo Padhye
openaire   +1 more source

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol

The Computer Journal, 2015
In this paper, we point out some faulty instantiations of threshold ring signatures (TRS) based on the threshold proof-of-knowledge (TPoK) protocol. Although a TRS can be regarded as the non-interactive version of the TPoK, the computational domains of the variables should be carefully chosen.
Liu, Joseph K   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy