نتایج جستجو برای: traceable ring signature

تعداد نتایج: 190150  

Journal: :CoRR 2018
Maria Francis Thibaut Verron

Signature-based algorithms have become a standard approach for Gröbner basis computations for polynomial systems over fields, but how to extend these techniques to coefficients in general rings is not yet as well understood. In this paper, we present a signature-based algorithm for computing Gröbner bases over principal ideal domains (e.g. the ring of integers or the ring of univariate polynomi...

2012
Yu-Fang Chung Tzer-Long Chen Tzer-Shyong Chen Chih-Sheng Chen

Rapid development of data processing systems has made digital signatures an essential application. A digital signature basically associates a signer with the message. Its important characteristics are easy verification, unforgeability and undeniability. However, conventional digital signature schemes generally consider only single signer situations; this is impractical, because the authorized s...

Journal: :I. J. Network Security 2016
Yan Xu Liusheng Huang Miaomiao Tian Hong Zhong

The ring signature scheme is a simplified group signature scheme for no manager while preserving unconditionally anonymous of the signer. Certificateless cryptography is introduced for eliminating the use of certificates in Public Key Infrastructure and solving the key-escrow problem in ID-based cryptogratography. Recently, Qin et al. proposed the first RSA-based certificateless ring signature ...

Journal: :I. J. Network Security 2014
Zhiguang Qin Hu Xiong Fagen Li

In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificatebased encryption lies in implicit certificate and no private key escrow. This feature is desirable especially for the efficiency and the real spontaneity of ring signature, which involve a large number of public keys in each execution. In this paper, we propose an efficient certificatebased ...

2003
Jiqiang Lv Kui Ren Xiaofeng Chen Kwangjo Kim

By combining the two notations of ring signature and authenticated encryption together, we introduce a new type of authenticated encryption signature, called ring authenticated encryption, which has the following properties: signer-ambiguity, signer-verifiability, recipient-designation, semantic-security, verification-convertibility, verification-dependence and recipient-ambiguity. We also give...

Journal: :JCIT 2010
Dongsheng Liu Hao Tian

Due to applications of trusted computing become more and more widespread, that how to protect client’s privacy is imminent. However, existing solutions can hardly meet practical requirement. Therefore, this dissertation puts forward an improved authentication which realizes Direct Anonymous Attestation with ring signature based on one-way accumulator, and constructs its solution in detail. In t...

2005
Javier Herranz Sotoca Germán Sáez

Digital signatures are one of the most important consequences of the appearance of public key cryptography, in 1976. These schemes provide authentication, integrity and non-repudiation to digital communications. Some extensions or variations of the concept of digital signature have been introduced, and many specific realizations of these new types of signature schemes have been proposed. In thi...

Journal: :IACR Cryptology ePrint Archive 2013
Carlos Aguilar Melchor Slim Bettaieb Xavier Boyen Laurent Fousse Philippe Gaborit

Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-andsign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signatur...

2014
Man Ho Au Willy Susilo

Ring signatures, introduced by Rivest, Shamir and Tauman, attest the fact that one member from a ring of signers has endorsed the message but no one can identify who from the ring is actually responsible for its generation. It was designed canonically for secret leaking. Since then, various applications have been discovered. For instance, it is a building block of optimistic fair exchange, dest...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید