AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on the RSA problem. A similar scheme was proposed by Guillou and Quisquater in 1988. Formal security of these schemes was not argued and/or proved until many years later [D. Pointcheval, J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology 13 (3) (2000) 361–396; Y. Dodis, J. Katz, S. Xu, M. Yung, Strong key-insulated signature schemes, in: Proceedings of PKC’03, in: LNCS, vol. 2567, Springer-Verlag, 2002, pp. 130–144; M. Bellare, C. Namprempre, G. Neven, Security proofs for identity-based identification and signature schemes, in: Proceedings of Eurocrypt’04, in: LNCS, vol. 3027, Springer-Verlag, 2004, p...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n -...
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive ...
MI: Global COE Program Education-and-Research Hub for Mathematics-for-IndustryグローバルCOEプログラム「マス・フォア・イ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
Email phishing attacks are one of today’s most common and costly forms of digital identity theft, wh...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC). W...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
This paper gives a solid and inspiring survey of ID-based ring signatures from a number of perspecti...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n -...
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive ...
MI: Global COE Program Education-and-Research Hub for Mathematics-for-IndustryグローバルCOEプログラム「マス・フォア・イ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
Email phishing attacks are one of today’s most common and costly forms of digital identity theft, wh...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC). W...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
This paper gives a solid and inspiring survey of ID-based ring signatures from a number of perspecti...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n -...
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive ...
MI: Global COE Program Education-and-Research Hub for Mathematics-for-IndustryグローバルCOEプログラム「マス・フォア・イ...