Sciweavers

29 search results - page 4 / 6
» Code-based Ring Signature Scheme
Sort
View
ACISP
2007
Springer
14 years 10 days ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
LATINCRYPT
2010
13 years 4 months ago
A Lattice-Based Threshold Ring Signature Scheme
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar’s code-based solution to use the short integer solution (SIS) problem as securi...
Pierre-Louis Cayrel, Richard Lindner, Markus R&uum...
WISA
2004
Springer
13 years 11 months ago
A Ring Signature Scheme Using Bilinear Pairings
Jing Xu, Zhenfeng Zhang, Dengguo Feng
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 6 months ago
Multi-Designated Verifiers Signatures Revisited
Multi-Designated Verifier Signatures (MDVS) are privacy-oriented signatures that can only be verified by a set of users specified by the signer. We propose two new generic constru...
Sherman S. M. Chow
CCS
2006
ACM
13 years 10 months ago
Ring signatures without random oracles
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of variations appeared in the literature. Almost all of the variations rely on the ra...
Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Li...