Articles with "ring signature" as a keyword



Practical Constant-Size Ring Signature

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Computer Science and Technology"

DOI: 10.1007/s11390-018-1838-z

Abstract: Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and… read more here.

Keywords: size ring; ring signature; constant size; signature ... See more keywords

Improved Dual-Protected Ring Signature for Security and Privacy of Vehicular Communications in Vehicular Ad-Hoc Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2822806

Abstract: As illegal access control, privacy disclosure and other threats in vehicular ad-hoc networks become more prevalent, and the importance of safety and privacy protection in vehicular communications grows significantly. The current communication protocols in vehicular… read more here.

Keywords: vehicular hoc; vehicular communications; hoc networks; signature ... See more keywords

RSHealth: A Ring Signature Scheme for Identity Anonymization and Transaction Privacy in Blockchain Based E-Healthcare Systems

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3439611

Abstract: The current healthcare infrastructure faces significant challenges, including security vulnerabilities, privacy breaches, data inconsistencies, and overly accessible health records. These issues highlight the urgent need for comprehensive reforms in information management and patient data protection.… read more here.

Keywords: signature scheme; transaction; ring signature; healthcare ... See more keywords

Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2020.2974954

Abstract: Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing. Any request sent from an… read more here.

Keywords: signature; flexible threshold; threshold ring; ring signature ... See more keywords

A novel quantum ring signature based on secret sharing

Sign Up to like & get
recommendations!
Published in 2024 at "Modern Physics Letters A"

DOI: 10.1142/s0217732323501754

Abstract: Quantum signature has become a hot topic in the current research of digital signature schemes due to its unconditional security. As a special kind of digital signature, ring signatures are frequently employed in practical situations… read more here.

Keywords: ring signature; based secret; signature; secret sharing ... See more keywords

A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model

Sign Up to like & get
recommendations!
Published in 2017 at "Mathematical Problems in Engineering"

DOI: 10.1155/2017/7696858

Abstract: Ring signature is a kind of digital signature which can protect the identity of the signer. Certificateless public key cryptography not only overcomes key escrow problem but also does not lose some advantages of identity-based… read more here.

Keywords: random oracle; certificateless ring; signature; ring signature ... See more keywords

ID-Based Ring Signature against Continual Side Channel Attack

Sign Up to like & get
recommendations!
Published in 2023 at "Symmetry"

DOI: 10.3390/sym15010179

Abstract: The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility… read more here.

Keywords: channel attack; signature; side channel; ring signature ... See more keywords