We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting. We propose a comprehensive security model, and construct a scheme based on the hardness of finding discrete logarithms, and (for forward security) inverting bilinear or multilinear maps of moderate degree to match the time granularity of forward security. We prove efficient security reductions—which, of independent interest, apply to, and are much tighter than, linkable ring signatures without forward security, thereby vastly improving the provable security of these legacy schemes. If efficie...
International audienceRing signatures make it possible for a signer to anonymously and, yet, convinc...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
We present the first linkable ring signature scheme with both unconditional anonymity and forward-se...
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revoca...
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones r...
LNCS v. 7043 has title: Information and communications security : 13th International Conference, ICI...
Abstract. A ring signature scheme is a group signature scheme with no group manager to setup a group...
We describe the first efficient ring signature scheme secure, without random oracles, based on stand...
International audience—Ring and group signatures allow their members to anonymously sign documents i...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
The article proposes an Online/Off-line Ring Signature Scheme in random oracle model.Security of the...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...
International audienceRing signatures make it possible for a signer to anonymously and, yet, convinc...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
Digital signatures are one of the most important consequences of the appearance of public key crypto...
We present the first linkable ring signature scheme with both unconditional anonymity and forward-se...
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revoca...
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones r...
LNCS v. 7043 has title: Information and communications security : 13th International Conference, ICI...
Abstract. A ring signature scheme is a group signature scheme with no group manager to setup a group...
We describe the first efficient ring signature scheme secure, without random oracles, based on stand...
International audience—Ring and group signatures allow their members to anonymously sign documents i...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
The article proposes an Online/Off-line Ring Signature Scheme in random oracle model.Security of the...
Abstract—Forward-secure signatures are proposed to tackle the key exposure problem, in which the sec...
International audienceRing signatures make it possible for a signer to anonymously and, yet, convinc...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
Digital signatures are one of the most important consequences of the appearance of public key crypto...