共 50 条
- [21] On the security models of (threshold) ring signature schemes INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 204 - 217
- [25] Analysis and Attack of Two Ring Signature Schemes AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 382 - 385
- [27] Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 373 - 403
- [28] A lattice-based ring signature scheme from bonsai trees Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2400 - 2403
- [29] A LATTICE-BASED DIGITAL SIGNATURE FROM THE RING-LWE PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), 2012, : 646 - 651
- [30] Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 66 - 85