نتایج جستجو برای: traceable ring signature

تعداد نتایج: 190150  

Journal: :IACR Cryptology ePrint Archive 2007
Sherman S. M. Chow Wun-She Yap

Ring signature scheme is a cryptographic construct that enables a signer to sign on behalf of a group of n different people such that the verifier can only ensure someone in the group signed, but not exactly whom. Ring signatures are utilized in many security applications. It is tricky to deploy multi-user cryptographic construct due to the complexity involved by certificates. Specifically, rin...

2006

Multi-Designated Verifier Signature (MDVS) is a privacy-oriented signature scheme in which the signature produced can only be verified by a specific set of users. A generic MDVS scheme was proposed recently, which can be constructed from some ring signature schemes and a secure multi-party computation (SMC) protocol. In this paper, we try to remove the requirement of the costly SMC. We propose ...

2014
Huaqun Wang Qianhong Wu Bo Qin Futai Zhang Josep Domingo-Ferrer

Conventionally, the unforgeability of ring signature schemes is defined in an ideal environment where the attackers cannot access any information about the secret keys of the signers. This assumption is too strong to be satisfied in the real world since the cryptographic operations involves the secret key information leakage in various ways due to power/time consumption difference in operations...

Journal: :IACR Cryptology ePrint Archive 2010
Zvika Brakerski Yael Tauman Kalai

In this work, we present a generic framework for constructing efficient signature schemes, ring signature schemes, and identity based encryption schemes, all in the standard model (without relying on random oracles). We start by abstracting the recent work of Hohenberger and Waters (Crypto 2009), and specifically their “prefix method”. We show a transformation taking a signature scheme with a v...

2013
Ali El Kaafarani Essam Ghadafi Dalia Khader

Attribute-based signatures allow a signer owning a set of attributes to anonymously sign a message w.r.t. some signing policy. A recipient of the signature is convinced that a signer with a set of attributes satisfying the signing policy has indeed produced the signature without learning the identity of the signer or which set of attributes was used in the signing. Traceable attribute-based sig...

2003
Chunming Tang Zhuojun Liu Mingsheng Wang

Lin-Wu’s ID-based ring signature scheme from bilinear pairings is unreasonable. In this paper, we improve it, and obtain a reasonable ID-based ring signature scheme from bilinear pairings.

2014
Snehal Pise

A credential system is a system in which users can obtain credentials from organizations and reveal possession of these credentials. This system is called anonymous when transactions carried out by the same user cannot be linked. In this paper we are describing few such credential systems. Nymble is a credential system in which servers themselves can blacklist misbehaving users, and thus blocks...

2007

Ring signatures, first introduced by Rivest, shamir, and Tauman, enable a user to sign a message so that a ring of possible signers (of which the user is a member) is identified, without revealing exactly which member of that ring actually generated the signature. In contrast to group signatures, ring signatures are completely “ad-hoc” and do not require any central authority or coordination am...

Journal: :IACR Cryptology ePrint Archive 2017
Huang Zhang Fangguo Zhang Haibo Tian Man Ho Au

In this paper, we construct an anonymous and decentralized cryptocash system which is secure in the quantum computation model. In order to achieve that, a linkable ring signature based on the ideal lattice is proposed. The size of a signature in our scheme is O(logN), where N is the cardinality of the ring. The framework of our cryptocash system follows that of CryptoNote with some modification...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید