Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate his data which can be put into the cloud for storage or analysis purpose. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-based (ID-based) ring sig...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
Digital signatures have been widely used in our life, and many variants of digital signatures have b...
It is practiced for users to influence cloud storage services to contribute to data with others in a...
Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on...
Cloud computing gives customers instant access to a network of remote servers, networks, and data ce...
In recent days Cloud computing is a rising technique which offers data sharing with more efficient, ...
Due to its openness, data speaking about is continually organized within the hostile setting and unc...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
Data can be stored in cloud and also shared among multiple users. But the correctness of data presen...
The Cloud computing is a rising technique which offers information sharing are more, and efficient e...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
This paper gives a solid and inspiring survey of ID-based ring signatures from a number of perspecti...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
Digital signatures have been widely used in our life, and many variants of digital signatures have b...
It is practiced for users to influence cloud storage services to contribute to data with others in a...
Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on...
Cloud computing gives customers instant access to a network of remote servers, networks, and data ce...
In recent days Cloud computing is a rising technique which offers data sharing with more efficient, ...
Due to its openness, data speaking about is continually organized within the hostile setting and unc...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
Data can be stored in cloud and also shared among multiple users. But the correctness of data presen...
The Cloud computing is a rising technique which offers information sharing are more, and efficient e...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
This paper gives a solid and inspiring survey of ID-based ring signatures from a number of perspecti...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
Digital signatures have been widely used in our life, and many variants of digital signatures have b...
It is practiced for users to influence cloud storage services to contribute to data with others in a...