Abstract: The ring signature is a group signature without a group manager, so that a signer realizes a signature in the name of the group. In some situations it is necessary for a message to be signed by more than one persons. The scheme of the ring signature with divided key is an algorithm which ensures realizing a key signature by a group of k entities from a group of n entities. Because of the way this scheme is elaborated, each signer has his own private key, which he uses in the signing phase. Checking the key is realized by using a single common public key. The signature scheme is based on the problem of the discrete logarithm. This cryptographic primitive ensures the anonymity of the signature, which is a ring signature
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
The security of the signature scheme is destroyed because its secret information of the signature sy...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
Abstract In a distributed ring signature scheme, a subset of users cooperate to compute a distribute...
Abstract. Ring signatures and group signatures are prominent cryptographic primitives offering a com...
In many applications of group signatures, not only a signer\u27s identity but also which group the s...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
Abstract. A ring signature scheme is a group signature scheme with no group manager to setup a group...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealin...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
The security of the signature scheme is destroyed because its secret information of the signature sy...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
Abstract In a distributed ring signature scheme, a subset of users cooperate to compute a distribute...
Abstract. Ring signatures and group signatures are prominent cryptographic primitives offering a com...
In many applications of group signatures, not only a signer\u27s identity but also which group the s...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
Abstract. A ring signature scheme is a group signature scheme with no group manager to setup a group...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealin...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
The security of the signature scheme is destroyed because its secret information of the signature sy...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...