Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Computer Science and Technology"
DOI: 10.1007/s11390-018-1838-z
Abstract: Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and…
read more here.
Keywords:
size ring;
ring signature;
constant size;
signature ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2822806
Abstract: As illegal access control, privacy disclosure and other threats in vehicular ad-hoc networks become more prevalent, and the importance of safety and privacy protection in vehicular communications grows significantly. The current communication protocols in vehicular…
read more here.
Keywords:
vehicular hoc;
vehicular communications;
hoc networks;
signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2020.2974954
Abstract: Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing. Any request sent from an…
read more here.
Keywords:
signature;
flexible threshold;
threshold ring;
ring signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Mathematical Problems in Engineering"
DOI: 10.1155/2017/7696858
Abstract: Ring signature is a kind of digital signature which can protect the identity of the signer. Certificateless public key cryptography not only overcomes key escrow problem but also does not lose some advantages of identity-based…
read more here.
Keywords:
random oracle;
certificateless ring;
signature;
ring signature ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Symmetry"
DOI: 10.3390/sym15010179
Abstract: The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility…
read more here.
Keywords:
channel attack;
signature;
side channel;
ring signature ... See more keywords