On the security of a practical constant-size ring signature scheme

被引:2
|
作者
Zhang, Jianhong [1 ]
Bai, Wenle [1 ,2 ]
Jiang, Zhengtao [1 ,3 ,4 ]
机构
[1] School of Electronic and Information Engineering, North China University of Technology, Beijing,100144, China
[2] Guangxi Key Laboratory of Cryptography and Information Security, Beijing,100144, China
[3] Guangxi Key Lab of Multi-source Information Mining and Security, Beijing,100144, China
[4] School of Electronic and Information Engineering, China Communication University, Beijing,100144, China
关键词
17;
D O I
10.6633/IJNS.20200522(3).04
中图分类号
学科分类号
摘要
引用
收藏
页码:394 / 398
相关论文
共 50 条
  • [21] Constant-size ID-based linkable and Revocable-iff-Linked Ring Signature
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Yuen, Tsz Hon
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 364 - +
  • [22] ABE for Circuits with Constant-Size Secret Keys and Adaptive Security
    Li, Hanjun
    Lin, Huijia
    Luo, Ji
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 680 - 710
  • [23] TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size
    Kang, Zhaozhe
    Li, Jiguo
    Shen, Jian
    Han, Jinguang
    Zuo, Yuting
    Zhang, Yichen
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (09) : 9514 - 9530
  • [24] Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Yuen, Tsz Hon
    THEORETICAL COMPUTER SCIENCE, 2013, 469 : 1 - 14
  • [25] A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model
    Sahin, Meryem Soysaldi
    Akleylek, Sedat
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 9852 - 9866
  • [26] A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List
    Attrapadung, Nuttapong
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 419 - 437
  • [27] An expressive decentralizing KP-ABE scheme with constant-size ciphertext
    Li, Qinyi
    Xiong, Hu
    Zhang, Fengli
    Zeng, Shengke
    Li, Q. (leebluedreams@gmail.com), 1600, Femto Technique Co., Ltd. (15): : 131 - 140
  • [28] A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
    Park, Jong Hwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (09) : 1620 - 1631
  • [29] Multi-User Searchable Encryption Scheme With Constant-Size Keys
    Chang, YuJui
    Wu, JaLing
    2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 98 - 103
  • [30] Expressive Key-policy Attribute-based Constant-size Signature
    Rani, Shikha
    Ali, Syed Taqi
    2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), 2017, : 101 - 104