Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the true identity of the signer among the group. A natural goal is to construct a ring signature scheme for which the signature size is short in the number of ring members. Moreover, such a construction should not rely on a trusted setup and be proven secure under falsifiable standard assumptions. Despite many years of research this question is still open. In this paper, we present the first construction of logarithmic-size ring signatures which do not rely on a trusted setup or the random oracle heuristic. Specifically, our scheme can be instantiated from standard assumptions and the size of signatures grows only logarithmically in the nu...
We propose a simple, general, and unified framework for constructing unique ring signatures that sim...
We consider threshold ring signatures (introduced by Bresson et al. [BSS02], where any t signers can...
In this paper we revise the idea of our previous work ‘Lin2-Xor lemma and Log-size Linkable Threshol...
Ring signatures are a cryptographic primitive that allow a signer to anonymously sign messages on be...
Ring signatures enable a user to anonymously sign a message on behalf of group of users. In this pap...
Ring signatures, introduced by Rivest, Shamir and Tauman (ASIACRYPT 2001), allow to sign a message o...
We construct efficient ring signatures from isogeny and lattice assumptions. Our ring signatures are...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
In this paper we introduce a novel method of constructing a linkable threshold ring signature withou...
International audienceRing signatures make it possible for a signer to anonymously and, yet, convinc...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revoca...
Abstract. Ring signature enables an user to anonymously sign a message on behalf of a group of users...
Ring signature (RS) allows users to demonstrate to verifiers their membership within a specified gro...
We propose a simple, general, and unified framework for constructing unique ring signatures that sim...
We consider threshold ring signatures (introduced by Bresson et al. [BSS02], where any t signers can...
In this paper we revise the idea of our previous work ‘Lin2-Xor lemma and Log-size Linkable Threshol...
Ring signatures are a cryptographic primitive that allow a signer to anonymously sign messages on be...
Ring signatures enable a user to anonymously sign a message on behalf of group of users. In this pap...
Ring signatures, introduced by Rivest, Shamir and Tauman (ASIACRYPT 2001), allow to sign a message o...
We construct efficient ring signatures from isogeny and lattice assumptions. Our ring signatures are...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
In this paper we introduce a novel method of constructing a linkable threshold ring signature withou...
International audienceRing signatures make it possible for a signer to anonymously and, yet, convinc...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revoca...
Abstract. Ring signature enables an user to anonymously sign a message on behalf of a group of users...
Ring signature (RS) allows users to demonstrate to verifiers their membership within a specified gro...
We propose a simple, general, and unified framework for constructing unique ring signatures that sim...
We consider threshold ring signatures (introduced by Bresson et al. [BSS02], where any t signers can...
In this paper we revise the idea of our previous work ‘Lin2-Xor lemma and Log-size Linkable Threshol...