Results 231 to 240 of about 121,764 (250)
Some of the next articles are maybe not open access.

A New Threshold Ring Signature for Ad-hoc Group

2007 Second International Conference on Communications and Networking in China, 2007
A number of peer to peer (P2P) systems as well as mobile ad-hoc networks (MANETs) fall into the category of ad hoc groups. Their needs for security have been widely recognized. Following this line, some signature schemes had introduced for ad hoc group. On the based of analyzing those scheme, we propose a threshold ring signature from bilinear pairings
Junfang Xiao, Guihua Zeng
openaire   +1 more source

A New Multivariate Based Threshold Ring Signature Scheme

2014
In CRYPTO 2011, Sakumoto et al. presented a 3-pass identification protocol whose security is solely based on the MQ problem. This identification protocol was extended to a threshold ring signature scheme by Petzoldt et al. via Fiat-Shamir transformation in AAECC 2013.
Jingwan Zhang, Yiming Zhao
openaire   +1 more source

Extendable Threshold Ring Signatures with Enhanced Anonymity

2023
Avitabile, Gennaro   +2 more
openaire   +1 more source

Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register

2007
For many practical usages or resource-limited environments, it is often desirable to speed up the cryptographic systems without any security lost. Linkable ring signature is a kind of signatures which can simultaneously provide the properties of anonymity, spontaneity as well as linkability.
Xiangxue Li, Dong Zheng, Kefei Chen
openaire   +1 more source

On the Security Models of (Threshold) Ring Signature Schemes

2005
We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. [1] and Abe et al. [1]. They offer different levels of security.
Joseph K. Liu, Duncan S. Wong
openaire   +1 more source

Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing

IEEE Transactions on Cloud Computing, 2022
Zhiwei Wang, Jiaxing Fan
exaly  

Identity-based threshold ring signature scheme with constant signature size

Journal of Computer Applications, 2013
Hua SUN   +3 more
openaire   +1 more source

Signer revocability for threshold ring signatures

Computer Standards & Interfaces
Da Teng, Yanqing Yao
openaire   +1 more source

An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications

IEEE Transactions on Wireless Communications, 2013
Jian Ren, Lein Harn
exaly  

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory

IEEE Transactions on Information Theory, 2011
Carlos Aguilar Melchor   +2 more
exaly  

Home - About - Disclaimer - Privacy