We present a new notion of identity-based quotable ring signature. This new cryptographic primitive can be used to derive new ring signatures on substrings of an original message from an original ring signature on the original message, which is generated by the actual signer included in the ring. No matter whether a ring signature is originally generated or is quoted from another valid ring signature, it will convince the verifier that it is generated by one of the ring members, without revealing any information about which ring member is the actual signer. The set of ring members could be arbitrarily selected by the actual signer without need of other ring members\u27 approval. The actual signer is anonymous among this set of ring members....
International audienceRing signature is a well-known cryptographic primitive that allows any user wh...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Email phishing attacks are one of today’s most common and costly forms of digital identity theft, wh...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
We describe the first efficient ring signature scheme secure, without random oracles, based on stand...
AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on ...
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of va...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC). W...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
International audienceRing signature is a well-known cryptographic primitive that allows any user wh...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Email phishing attacks are one of today’s most common and costly forms of digital identity theft, wh...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
We describe the first efficient ring signature scheme secure, without random oracles, based on stand...
AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on ...
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of va...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
In this paper, we present a new concept called an identity based ring signcryption scheme (IDRSC). W...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
International audienceRing signature is a well-known cryptographic primitive that allows any user wh...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Email phishing attacks are one of today’s most common and costly forms of digital identity theft, wh...