Schemes for encryption with anonymity and ring signature

被引:1
|
作者
Hayashi, R [1 ]
Tanaka, K [1 ]
机构
[1] Tokyo Inst Technol, Dept Math & Comp Sci, Tokyo 1528552, Japan
关键词
encryption; ring signature; key-privacy; anonymity;
D O I
10.1093/ietfec/e89-a.1.66
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present previously unproposed schemes for encryption with anonymity and ring signature by applying two techniques. That is, we construct a key-privacy encryption scheme by using N-ary representation, and a ring signature scheme by using the repetition of evaluation of functions. We analyze precisely the properties of these schemes and show their advantage and disadvantage.
引用
收藏
页码:66 / 73
页数:8
相关论文
共 50 条
  • [1] Schemes for encryption with anonymity and ring signature
    Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo, 152-8552, Japan
    不详
    IEICE Trans Commun, 2006, 1 (66-73):
  • [2] Schemes for encryption with anonymity and ring signature
    Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo, 152-8552, Japan
    不详
    IEICE Trans Fund Electron Commun Comput Sci, 2006, 1 (66-73):
  • [3] A Closer Look at Anonymity and Robustness in Encryption Schemes
    Mohassel, Payman
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 501 - 518
  • [4] RANDOMIZED ENCRYPTION AND SIGNATURE SCHEMES
    ALDARWISH, NA
    ARAB GULF JOURNAL OF SCIENTIFIC RESEARCH, 1994, 12 (01): : 41 - 53
  • [5] Linkable Ring Signature with Unconditional Anonymity
    Liu, Joseph K.
    Au, Man Ho
    Susilo, Willy
    Zhou, Jianying
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (01) : 157 - 165
  • [6] A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
    Loh, Jia-Ch'ng
    Heng, Swee-Huay
    Tan, Syh-Yuan
    Kurosawa, Kaoru
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 112 - 125
  • [7] On the Security of a Proxy Ring Signature with Revocable Anonymity
    Zhang, Jianhong
    Yang, Yixian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 205 - +
  • [8] Ring Signature With Unconditional Anonymity in the Plain Model
    Hara, Keisuke
    Tanaka, Keisuke
    IEEE ACCESS, 2021, 9 : 7762 - 7774
  • [9] On the Security of a Proxy Ring Signature with Revocable Anonymity
    Zhang, Jianhong
    Li, Pengyan
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07): : 1169 - 1175
  • [10] A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
    Tsang, Patrick P.
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    PROVABLE SECURITY, 2010, 6402 : 166 - +