Email phishing attacks are one of today’s most common and costly forms of digital identity theft, where an adversary tricks a user into revealing their personal information by impersonating an established company. Such attacks could be mitigated with digitally-signed emails, if these signatures did not: (1) destroy the traditional repudiability of email, and (2) require the unrealistic, widespread adoption of a Public-Key Infrastructure (PKI). In order to overcome these obstacles, we introduce, define, and implement separable (a.k.a. crossdomain) identity-based ring signatures (SIBR, pronounced “cyber, ” signatures). The ring structure of these signatures provides repudiability. With identity-based public keys, a full PKI is no longer requi...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
In traditional public key cryptography, public keys of users are essentially random strings generate...
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC). W...
AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on ...
Phishing emails are one of today’s most common and costly forms of digital identity theft. They are ...
This paper gives a solid and inspiring survey of ID-based ring signatures from a number of perspecti...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive ...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
In traditional public key cryptography, public keys of users are essentially random strings generate...
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC). W...
AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on ...
Phishing emails are one of today’s most common and costly forms of digital identity theft. They are ...
This paper gives a solid and inspiring survey of ID-based ring signatures from a number of perspecti...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented ...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive ...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
In traditional public key cryptography, public keys of users are essentially random strings generate...
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC). W...