Filters








187,976 Hits in 3.0 sec

Ring signatures

Kazuki Yoneyama, Kazuo Ohta
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
First, we will formulate new ideal functionalities of ring signature schemes for each security levels separately.  ...  s ring signature scheme following the UC secure definition by constructing a simulator to an adversary of sUF, which can be adaptable to the case of sUF under the assumption of a standard single sUF signature  ...  RING SIGNATURE FUNCTIONALITY In this section, we will introduce a new definition of ring signature schemes in UC framework, i.e., a new ideal ring signature functionality F (uf ,anon) rSIG .  ... 
doi:10.1145/1229285.1229332 dblp:conf/ccs/YoneyamaO07 fatcat:g4u5pm57u5cqtkouzy7dize5oe

Traceable Ring Signature

E. FUJISAKI, K. SUZUKI
2008 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
A traceable ring scheme is a ring signature except that it can restrict "excessive" anonymity.  ...  The ring signature is, however, vulnerable to malicious or irresponsible signers in some applications, because of its anonymity. In this paper, we propose a traceable ring signature scheme.  ...  . , pk n ) as a ring. We define a traceable ring signature scheme as indicated below.  ... 
doi:10.1093/ietfec/e91-a.1.83 fatcat:tzzjzpbvvfbalg7d5aowlxunei

Ring Group Signatures

Liqun Chen
2012 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications  
a Ring Signature (RS for short) [31].  ...  In this paper, we study these applications and combine a group signature with a ring signature to create a ring group signature, which specifies a set of possible groups without revealing which member  ...  Linkable threshold ring signatures [34] hold the properties of linkable ring signatures and threshold ring signatures.  ... 
doi:10.1109/trustcom.2012.246 dblp:conf/trustcom/Chen12 fatcat:pdclevq3kveqlin6nkyd2uas4u

Generalized Ring Signatures

J. Ren, L. Harn
2008 IEEE Transactions on Dependable and Secure Computing  
The concept of ring signature was first introduced by Rivest et al. in 2001.  ...  Comparing to ring signatures based on RSA algorithm, the proposed generalized ring signature scheme has three advantages: 1) all ring members can share the same prime number p and all operations can be  ...  ring signature.  ... 
doi:10.1109/tdsc.2008.22 fatcat:p6cl4lrpjzc5hn3bjrq3kfwztu

Signatures on semilocal rings

Manfred Knebusch, Alex Rosenberg, Roger Ware
1972 Bulletin of the American Mathematical Society  
If A is a discrete rank one valuation ring and (7(1 + m) = 1, then there are exactly two orderings on A inducing the signature a. Let A now again be a general semilocal ring as above. PROPOSITION 1.  ...  If A is a field the signatures correspond bijectively with the orderings of A. (ii) Let A be the local ring of the affine curve X 2 + Y 2 = 0 over the real field R at (0,0).  ...  If A is a discrete rank one valuation ring and (7(1 + m) = 1, then there are exactly two orderings on A inducing the signature a. Let A now again be a general semilocal ring as above.  ... 
doi:10.1090/s0002-9904-1972-12852-0 fatcat:rq5irfe63fejth4wpthil5l6ea

Signatures on semilocal rings

Manfred Knebusch, Alex Rosenberg, Roger Ware
1973 Journal of Algebra  
Since there is a bijection of the set of signatures with a set of prime ideals in a commutative ring, the Zariski topology induces a topology on the set of signatures on a semilocal ring with involution  ...  Most of ;)ur results concern-the extensions of signatures of a semilocal ring -4 to signatures on a Galois extension B with group G, in the sense of [5] and [15] .  ...  PROOF OF YROPOSITION 2.5 In this section C always denotes a connected semilocal ring with involution J : y + f and A the fixed ring of J.  ... 
doi:10.1016/0021-8693(73)90021-5 fatcat:oymtcl5jv5fqfpdvffk26xlpqi

Self-certified ring signatures

Nan Li, Yi Mu, Willy Susilo, Fuchun Guo
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
based ring signatures.  ...  We present a new notion, Self-certified Ring Signature (SCRS), to provide an alternative solution to the certificate management problem in ring signatures and eliminate private key escrow problem in identity  ...  Ring signatures are group-oriented digital signatures, which achieve signer anonymity as a major feature.  ... 
doi:10.1145/1966913.1966966 dblp:conf/ccs/LiMSG11 fatcat:hwmftkvb6bg3ve2o5ngn4wwqeq

Group-Oriented Ring Signature

Chunbo Ma, Jun Ao
2011 Journal of Convergence Information Technology  
In this paper, we present an improved Rivest's ring signature scheme.  ...  In our scheme, the size of the signature is only related to the ring members, and the signer needs no to publish amount of random numbers. On this basis, we propose a group-oriented ring signature.  ...  Rivest's ring signature scheme In a ring signature scheme, a message signer forms a ring of any set of possible signer including him/herself.  ... 
doi:10.4156/jcit.vol6.issue10.2 fatcat:dy5lgeg7dngbpbb2e3qcw6kf44

Identity Based Threshold Ring Signature [chapter]

Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
2005 Lecture Notes in Computer Science  
scheme (when t = 1) and threshold ring signature scheme from pairings.  ...  To the best of authors' knowledge, our scheme is the first ID-based threshold ring signature scheme which is also the most efficient (in terms of number of pairing operations required) IDbased ring signature  ...  Using bilinear pairing to construct ring signature is not a new idea. Inspired by the aggregate signature, a ring signature scheme was proposed in [6] .  ... 
doi:10.1007/11496618_17 fatcat:boetdxk4i5dc5lpowm4zpl57qm

Certificateless linkable ring signature scheme

Lunzhi Deng, Hongyu Shi, Yan Gao
2020 IEEE Access  
Ring signature is an anonymous signature that both authenticates the message and protects the identity information of the signer.  ...  INDEX TERMS Anonymous, certificateless cryptography, elliptic curve group, linkable, ring signature.  ...  In ''regular'' ring signature schemes, the signer can generate multiple different signatures for the same message.  ... 
doi:10.1109/access.2020.2981360 fatcat:4mtzg32msnabjpsly4esfawmmu

Ring signatures without random oracles

Sherman S. M. Chow, Victor K. Wei, Joseph K. Liu, Tsz Hon Yuen
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of variations appeared in the literature.  ...  In this paper, we propose a ring signature scheme based on bilinear pairings, which is proven to be secure against adaptive chosen message attack without using the random oracle model.  ...  the ring signature.  ... 
doi:10.1145/1128817.1128861 dblp:conf/ccs/ChowWLY06 fatcat:jkypm6jhfffd7j7kkgzcd6qagi

Short Linkable Ring Signatures Revisited [chapter]

Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang
2006 Lecture Notes in Computer Science  
Linkable ring signature is a variant such that two signatures can be linked if and only if they were signed by the same person. Recently, the first short linkable ring signature has been proposed.  ...  Ring signature is a group-oriented signature in which the signer can spontaneously form a group and generate a signature such that the verifier is convinced the signature was generated by one member of  ...  Spontaneity is a property which makes distinction between ring signatures and group signatures [8] .  ... 
doi:10.1007/11774716_9 fatcat:ziglodnwz5cc7gxbajkxfnbptm

Designated-Verifier Linkable Ring Signatures [article]

Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis, Marianna Spyrakou
2022 IACR Cryptology ePrint Archive  
We introduce Designated-Verifier Linkable Ring Signatures (DVLRS), a novel cryptographic primitive which combines designatedverifier and linkable ring signatures 1 .  ...  This increases the privacy of the participants, as it does not allow an adversary to bypass the anonymity provided by ring signatures by using the content of a message to identify the signer.  ...  The notions of designated verifier and ring signatures have been combined in [10] , where any holder of a ring signature can designate it to a verifier, and [9] which provides a strong DV ring signature  ... 
dblp:journals/iacr/BehrouzGKPS22 fatcat:wk4eooqijrb6hamwf4wsipz4zm

Identity-based quotable ring signature

Kefeng Wang, Yi Mu, Willy Susilo
2015 Information Sciences  
We present a new notion of identity-based quotable ring signature.  ...  At the same time, the verifier could not distinguish whether a ring signature is originally generated or is quoted from another ring signature.  ...  In ring signature schemes, all ring members' information serves as a part of the ring signature.  ... 
doi:10.1016/j.ins.2015.05.033 fatcat:yppbiejnkfcn7bzxrlvlwgl74e

Separable Linkable Threshold Ring Signatures [chapter]

Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
2004 Lecture Notes in Computer Science  
A ring signature scheme is a group signature scheme with no group manager to setup a group or revoke a signer.  ...  A linkable ring signature, introduced by Liu, et al. [20] , additionally allows anyone to determine if two ring signatures are signed by the same group member (a.k.a. they are linked ).  ...  Linkable Ring Signatures. The notion of linkable ring signatures was introduced by Liu, et al. [20] .  ... 
doi:10.1007/978-3-540-30556-9_30 fatcat:gmrcd3d4ivdchf75o2dyda75wu
« Previous Showing results 1 — 15 out of 187,976 results