نتایج جستجو برای: traceable ring signature

تعداد نتایج: 190150  

2006
Man Ho Au Joseph K. Liu Willy Susilo Tsz Hon Yuen

In this paper, we propose a new notion called Revocable-iffLinked Ring Signature (R-iff-L Ring Signature). In R-iff-L ring signatures, a signer can sign on behalf of the whole group, just like ordinary ring signatures. However, if he signs twice or more, he can be linked and his identity can be revoked by everyone. We formally define a new security model for the new notion in identity-based (ID...

Journal: :Science China Information Sciences 2014

Journal: :I. J. Network Security 2015
Hu Xiong Ji Geng Zhiguang Qin Guobin Zhu

Signcryption can offer authentication and confidentiality simultaneously with better efficiency than traditional signature-then-encryption approach. Ring signature enables a user to conscribe arbitrarily a group of ring members and sign a message on behalf of the ring (which includes himself) without revealing his real identity. By integrating the notion of signcryption and ring signature, ring...

Journal: :The Journal of Engineering 2019

Journal: :CoRR 2014
Shangping Wang Ru zhao

Abstract: On the basis of the signatures scheme without trapdoors from lattice, which is proposed by Vadim Lyubashevsky in 2012, we present a new ring signature scheme from lattice. The proposed ring signature scheme is an extension of the signatures scheme without trapdoors. We proved that our scheme is strongly unforgeable against adaptive chosen message in the random oracle model, and proved...

Journal: :IACR Cryptology ePrint Archive 2004
Patrick P. Tsang Victor K.-W. Wei Tony K. Chan Man Ho Au Joseph K. Liu Duncan S. Wong

A ring signature scheme is a group signature scheme with no group manager to setup a group or revoke a signer. A linkable ring signature, introduced by Liu, et al. [20], additionally allows anyone to determine if two ring signatures are signed by the same group member (a.k.a. they are linked). In this paper, we present the first separable linkable ring signature scheme, which also supports an e...

Journal: :IACR Cryptology ePrint Archive 2004
Sherman S. M. Chow Siu-Ming Yiu Lucas Chi Kwong Hui

Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates and the need for registering for a certificate before getting the public key. These two features are desirable especially for the efficiency and the real spontaneity of ring signature, where a user can anonymously sign a message on behalf of a group of spontaneously conscripted users including t...

Journal: :I. J. Network Security 2007
Dong Zheng Xiangxue Li Kefei Chen

McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosystems like McEliece do not allow practical digital signatures. Although X.M. Wang presented a code-based signature scheme in 1990, some authors find that it is not secure. Recently, T.Courtois et al. show a new way to ...

Journal: :Computers & Mathematics with Applications 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید