Results 231 to 240 of about 121,764 (250)
Some of the next articles are maybe not open access.
A New Threshold Ring Signature for Ad-hoc Group
2007 Second International Conference on Communications and Networking in China, 2007A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized. Following this line, some signature schemes had introduced for ad hoc group. On the based of analyzing those scheme, we propose a threshold ring signature from bilinear pairings
Junfang Xiao, Guihua Zeng
openaire +1 more source
A New Multivariate Based Threshold Ring Signature Scheme
2014In CRYPTO 2011, Sakumoto et al. presented a 3-pass identification protocol whose security is solely based on the MQ problem. This identification protocol was extended to a threshold ring signature scheme by Petzoldt et al. via Fiat-Shamir transformation in AAECC 2013.
Jingwan Zhang, Yiming Zhao
openaire +1 more source
Extendable Threshold Ring Signatures with Enhanced Anonymity
2023Avitabile, Gennaro +2 more
openaire +1 more source
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register
2007For many practical usages or resource-limited environments, it is often desirable to speed up the cryptographic systems without any security lost. Linkable ring signature is a kind of signatures which can simultaneously provide the properties of anonymity, spontaneity as well as linkability.
Xiangxue Li, Dong Zheng, Kefei Chen
openaire +1 more source
On the Security Models of (Threshold) Ring Signature Schemes
2005We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. [1] and Abe et al. [1]. They offer different levels of security.
Joseph K. Liu, Duncan S. Wong
openaire +1 more source
Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing
IEEE Transactions on Cloud Computing, 2022Zhiwei Wang, Jiaxing Fan
exaly
Identity-based threshold ring signature scheme with constant signature size
Journal of Computer Applications, 2013Hua SUN +3 more
openaire +1 more source
Signer revocability for threshold ring signatures
Computer Standards & InterfacesDa Teng, Yanqing Yao
openaire +1 more source
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications
IEEE Transactions on Wireless Communications, 2013Jian Ren, Lein Harn
exaly
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
IEEE Transactions on Information Theory, 2011Carlos Aguilar Melchor +2 more
exaly

