搜索结果: 16-28 共查到“军事学 ring signature”相关记录28条 . 查询时间(0.093 秒)
In this paper, we present an improved Rivest's ring signature scheme. In our scheme, the size of the signature is only related to the ring members, and the signer needs no to publish amount of random ...
Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation
Ring signature identity-based ring signature lattices basis delegation
2010/7/14
In this paper, we propose a ring signature (RS) and an identity-based ring signature (IBRS) schemes using the lattice basis del- egation technique due to [10,22]. The schemes are unforgeable and hold ...
The Fiat--Shamir Transform for Group and Ring Signature Schemes
The Fiat--Shamir Transform Group and Ring Signature Schemes
2010/7/14
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signature scheme is secure ...
A provably secure ID-based ring signature scheme
secure ID-based ring signature scheme cyptosystem
2009/4/10
A provably secure ID-based ring signature scheme.
An identity-based ring signature scheme from bilinear pairings
ring signature identity-based bilinear pairings
2009/4/9
At the conference Asiacrypt 2001, Rivest, Shamir and Tauman firstly addressed the
concept of ring signature. In this paper we propose an identity-based ring signature
scheme from bilinear pairings. ...
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Proxy signature ID-based cryptography Proxy blind signature Proxy ring signature
2009/4/9
Proxy signatures are very useful tools when one needs to
delegate his/her signing capability to other party. After Mambo et al:’s
first scheme was announced, many proxy signature schemes and various...
Efficient Identity Based Ring Signature
Identity-based signature ring signature bilinear pairings
2009/4/2
Identity-based (ID-based) cryptosystems eliminate the need
for validity checking of the certificates and the need for registering for a
certificate before getting the public key. These two features ...
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Cryptography Digital Signature Ring Signature
2009/3/27
In 2001, Rivest et al. firstly introduced the concept of ring
signatures. A ring signature is a simplified group signature without any
manager. It protects the anonymity of a signer. The first schem...
Identity Based Threshold Ring Signature
Threshold ring signature identity-based signature bilinear pairings
2009/3/27
In threshold ring signature schemes, any group of t entities
spontaneously conscript arbitrarily n-t entities to generate a publicly
verifiable t-out-of-n signature on behalf of the whole group, yet...
Solutions to Key Exposure Problem in Ring Signature
Forward Secure Key-Insulated Ring Signature
2009/3/18
In this paper, we suggest solutions to the key exposure problem
in ring signature. In particular, we propose the first forward secure
ring signature scheme and the first key-insulated ring signature...
A Suite of ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
ID-Based Cryptography Ring Signature Anonymity Linkability
2009/3/5
Since the introduction of Identity-based (ID-based) cryptography
by Shamir in 1984, numerous ID-based signature schemes have
been proposed. In 2001, Rivest et al. introduced ring signature that prov...
In this paper, we propose a new concept “Meta Ring Signature”. In Digital
Signature, first a private key is picked. Next, the public key is obtained in
terms of the private key. Then we can sign on ...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity
escrow. At the same time, the ring signature provides great flexibility: No group manager, no
special set...