New identity-based ring signature in the standard model

被引:0
|
作者
Applied Mathematics Department, Xidian University, Xi'an 710071, China [1 ]
不详 [2 ]
机构
来源
Dianzi Yu Xinxi Xuebao | 2009年 / 7卷 / 1727-1731期
关键词
Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1727 / 1731
相关论文
共 50 条
  • [41] Fuzzy Identity-Based Ring Signature from Lattices
    Cao, Chengtang
    You, Lin
    Hu, Gengran
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [42] Identity-based Threshold Ring Signature Without Pairings
    Xiong Hu
    Qin ZhiGuang
    Li Fagen
    Jin Jing
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 537 - 541
  • [43] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 181 - 192
  • [44] Identity-Based Ring Signature Schemes for Multiple Domains
    Ki, JuHee
    Hwang, Jung Yeon
    Lee, Dong Hoon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2692 - 2707
  • [45] An identity-based ring signature scheme with enhanced privacy
    Gamage, Chandana
    Gras, Ben
    Crispo, Bruno
    Tanenbaum, Andrew S.
    2006 SECURECOMM AND WORKSHOPS, 2006, : 257 - +
  • [46] Subliminal channels in the identity-based threshold ring signature
    Yang, Chao-Lin
    Li, Chuan-Ming
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2009, 86 (05) : 753 - 770
  • [47] Revocable identity-based proxy re-signature scheme in the standard model
    Yang X.
    Li Y.
    Wang J.
    Ma T.
    Wang C.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 153 - 162
  • [48] An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction
    Hu, Xiaoming
    Lu, Hong
    Xu, Huajie
    Wang, Jian
    Yang, Yinchun
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 309 - 319
  • [49] Identity-based ring signature scheme with constant-size signature
    Wang, Ling-Ling
    Zhang, Guo-Yin
    Ma, Chun-Guang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (11): : 2645 - 2648
  • [50] A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model
    Zhang, Lili
    Ma, Yanqin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014