Identity-based traceable ring signature scheme on lattice

被引:0
|
作者
Ye, Qing [1 ]
Chen, Qingqing [1 ]
Dou, Yongpeng [2 ]
Zhang, Jing [1 ]
Tang, Yongli [1 ]
机构
[1] School of Software, Henan Polytechnic University, Jiaozuo,454003, China
[2] The Seventh Military Representative Office of the Military Representative Bureau of the Army Equipment Department in Xi'an, Xi'an,710065, China
关键词
D O I
10.19665/j.issn1001-2400.2023.02.016
中图分类号
学科分类号
摘要
引用
收藏
页码:161 / 168
相关论文
共 50 条
  • [21] An Identity-Based Blind Signature Scheme Using Lattice with Provable Security
    Li, Quanrun
    Hsu, Chingfang
    He, Debiao
    Choo, Kim-Kwang Raymond
    Gong, Peng
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [22] Anonymous Lattice Identity-Based Encryption with Traceable Identities
    Boyen, Xavier
    Foo, Ernest
    Li, Qinyi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 630 - 649
  • [23] An identity-based proxy ring signature scheme from bilinear pairings
    Cheng, WQ
    Lang, WM
    Yang, ZK
    Liu, G
    Tan, YM
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 424 - 429
  • [24] An Enhanced Constant-Size Identity-Based Ring Signature Scheme
    Hu, Chengyu
    Liu, Pengtao
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 587 - +
  • [25] Another efficient identity-based ring signature scheme and its extension
    Zhang, Jianhong
    Ji, Cheng
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 286 - 288
  • [26] A short identity-based proxy ring signature scheme from RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. COMPUTER STANDARDS & INTERFACES, 2015, 38 : 144 - 151
  • [27] Identity-based puncturable signature scheme
    Yang, Dongmei
    Chen, Yue
    Wei, Jianghong
    Hu, Xuexian
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (12): : 17 - 26
  • [28] A Practical Identity-Based Signature Scheme
    LI Chenghua1
    2. Department of Mechanical and Aerospace Engineering
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 692 - 696
  • [29] Identity-based ring signature scheme with multi-designated verifiers
    Qu, Yunyun
    Zeng, Jiwen
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2023, 43 (01) : 18 - 28
  • [30] Identity-Based Secret Signature Scheme
    Lee, Byoungcheon
    Li, Jin
    Kim, Kwangjo
    [J]. ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1080 - +