The anonymity provided by the threshold ring signature scheme proposed by Bresson et al (Crypto'02) is perfect. However, its complexity is prohibitively large even for relatively small sets of signers. We propose use of threshold schemes based on covering designs that are efficient for large groups of signers. The cost we pay is non-perfect anonymity
In this paper, we propose an efficient (n − t)-out-of-n threshold ring signature scheme which is eff...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
[[abstract]]The first strong designated-verifier ring signature scheme provides signer ambiguity to ...
We consider threshold ring signatures (introduced by Bresson et al. [BSS02], where any t signers can...
International audienceA threshold ring signature scheme enables a set of users to sign a message suc...
Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealin...
Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [26]. These signatures allow a ...
International audience—Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. Th...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n -...
[[abstract]]Hwang and Cheng proposed the first strong designated-verifier ring signature scheme prov...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
Ring signatures are a cryptographic primitive that allow a signer to anonymously sign messages on be...
© 2020 Elsevier B.V. At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification prot...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
In this paper, we propose an efficient (n − t)-out-of-n threshold ring signature scheme which is eff...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
[[abstract]]The first strong designated-verifier ring signature scheme provides signer ambiguity to ...
We consider threshold ring signatures (introduced by Bresson et al. [BSS02], where any t signers can...
International audienceA threshold ring signature scheme enables a set of users to sign a message suc...
Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealin...
Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [26]. These signatures allow a ...
International audience—Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. Th...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n -...
[[abstract]]Hwang and Cheng proposed the first strong designated-verifier ring signature scheme prov...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
Ring signatures are a cryptographic primitive that allow a signer to anonymously sign messages on be...
© 2020 Elsevier B.V. At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification prot...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
In this paper, we propose an efficient (n − t)-out-of-n threshold ring signature scheme which is eff...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
[[abstract]]The first strong designated-verifier ring signature scheme provides signer ambiguity to ...