Articles with "ring signature" as a keyword



Photo by nickkarvounis from unsplash

Practical Constant-Size Ring Signature

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Computer Science and Technology"

DOI: 10.1007/s11390-018-1838-z

Abstract: Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and… read more here.

Keywords: size ring; ring signature; constant size; signature ... See more keywords
Photo by neonbrand from unsplash

Improved Dual-Protected Ring Signature for Security and Privacy of Vehicular Communications in Vehicular Ad-Hoc Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2822806

Abstract: As illegal access control, privacy disclosure and other threats in vehicular ad-hoc networks become more prevalent, and the importance of safety and privacy protection in vehicular communications grows significantly. The current communication protocols in vehicular… read more here.

Keywords: vehicular hoc; vehicular communications; hoc networks; signature ... See more keywords
Photo by nickkarvounis from unsplash

Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2020.2974954

Abstract: Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing. Any request sent from an… read more here.

Keywords: signature; flexible threshold; threshold ring; ring signature ... See more keywords

A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model

Sign Up to like & get
recommendations!
Published in 2017 at "Mathematical Problems in Engineering"

DOI: 10.1155/2017/7696858

Abstract: Ring signature is a kind of digital signature which can protect the identity of the signer. Certificateless public key cryptography not only overcomes key escrow problem but also does not lose some advantages of identity-based… read more here.

Keywords: random oracle; certificateless ring; signature; ring signature ... See more keywords
Photo by vita_belvita from unsplash

ID-Based Ring Signature against Continual Side Channel Attack

Sign Up to like & get
recommendations!
Published in 2023 at "Symmetry"

DOI: 10.3390/sym15010179

Abstract: The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility… read more here.

Keywords: channel attack; signature; side channel; ring signature ... See more keywords