Results 221 to 230 of about 121,764 (250)
Some of the next articles are maybe not open access.
A Separable Threshold Ring Signature Scheme
2004We present a threshold ring signature scheme (spontaneous anonymous threshold signature scheme) that allows the use of both RSA-based and DL-based public keys at the same time. More generally, the scheme supports the mixture of public keys for any trapdoor-one-way type as well as three-move type signature schemes. This kind of ‘separability’ has useful
Joseph K. Liu +2 more
openaire +1 more source
Identity Based Threshold Ring Signature from Lattices
2014In the graded encoding systems that can be used to construct multilinear maps, the graded Computational Deffie-Hellman problem gGCDHP problem is assumed to be hard. We present an equivalent problem, called the variant graded Computational Deffie-Hellman problem vGCDHP, and make generalization to get the general graded Computational Deffie-Hellman ...
Baodian Wei +5 more
openaire +1 more source
A Novel Lattice-Based Threshold Ring Signature Scheme
2020 5th International Conference on Computer Science and Engineering (UBMK), 2020In this paper, we present a new TRSS (threshold ring signature scheme) which depends on the worst-case hardness of a lattice problem. We apply Fiat-Shamir transform to a lattice-based identification scheme to obtain the proposed scheme. The hardness of the identification scheme which is the hybrid combination of two different designs is based on ...
Sedat Akleylek, Meryem Soysaldi
openaire +1 more source
Concise RingCT Protocol Based on Linkable Threshold Ring Signature
IEEE Transactions on Dependable and Secure ComputingJunke Duan +5 more
openaire +3 more sources
Threshold Ring Signatures with Accountability
Threshold ring signatures (TRS) allow several signers to sign the same message on behalf of a group. This scheme is fully anonymity in that a signature reveals the number of signers who created the signature but tells nothing about the identity of all signers who participated in generating the signature.Xuan Thanh Khuc +5 more
openaire +2 more sources
Provably Secure Code-Based Threshold Ring Signatures
2009A threshold ring signature scheme enables a set of users to sign a message such that a finite set of possible signers (the ring) is identified, without revealing which subset of ring members actually produced the signature. A recent proposal of Aguillar et al. introduced the first code-based threshold ring signature scheme which large signatures (about
Dallot, Léonard, Vergnaud, Damien
openaire +1 more source
A new identity-based threshold ring signature scheme
2011 IEEE International Conference on Systems, Man, and Cybernetics, 2011Aiming at the security problems existed in most identity-based threshold ring signature (ITRS) schemes, including poor security and inefficient in verifying, a new ITRS scheme is proposed. We significantly enhance the security of signature key by using bilinear pairings and secret sharing techniques.
Feng Xu, Xin Lv
openaire +1 more source
Improved Threshold Ring Signature for Ad-Hoc Group
2006 International Conference on Wireless Communications, Networking and Mobile Computing, 2006A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized, so some signature schemes had been introduced for the ad hoc group. On the basis of analyzing those schemes, we propose a threshold ring signature from bilinear pairings for ad ...
Junfang Xiao +3 more
openaire +1 more source
Threshold Ring Signature with Message Block Sharing
2019Lattices have attracted a great attention during recent years and many signature schemes have emerged based on lattices. In this paper we have proposed Threshold-Ring Signature K–out–of–Nscheme, here signature is generated by a subset of K signers from the N signers while maintaining the anonymity of these K signers using the Ring Signature by Wang et ...
Swati Rawal, Sahadeo Padhye
openaire +1 more source
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol
The Computer Journal, 2015In this paper, we point out some faulty instantiations of threshold ring signatures (TRS) based on the threshold proof-of-knowledge (TPoK) protocol. Although a TRS can be regarded as the non-interactive version of the TPoK, the computational domains of the variables should be carefully chosen.
Liu, Joseph K +5 more
openaire +2 more sources

