LNCS v. 7043 has title: Information and communications security : 13th International Conference, ICICS 2011 ... proceedingsIn this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period. This is especially useful in the case of ring signature, as the exposure of a single secret key may result in the invalidity of thousands or even millions ring signatures which contain that particular user. However, most of the ring signature schemes in the literature do no...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n -...
Ring signatures make it possible for a signer to anonymously and, yet, convincingly leak a secret by...
The article proposes an Online/Off-line Ring Signature Scheme in random oracle model.Security of the...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Ring signature schemes provide a way to sign a message without exposing the identity of authentic si...
Ring signatures enable a user to anonymously sign a message on behalf of group of users. In this pap...
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of va...
The security of the signature scheme is destroyed because its secret information of the signature sy...
We present the first linkable ring signature scheme with both unconditional anonymity and forward-se...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
We describe the first efficient ring signature scheme secure, without random oracles, based on stand...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n -...
Ring signatures make it possible for a signer to anonymously and, yet, convincingly leak a secret by...
The article proposes an Online/Off-line Ring Signature Scheme in random oracle model.Security of the...
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Ring signature schemes provide a way to sign a message without exposing the identity of authentic si...
Ring signatures enable a user to anonymously sign a message on behalf of group of users. In this pap...
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of va...
The security of the signature scheme is destroyed because its secret information of the signature sy...
We present the first linkable ring signature scheme with both unconditional anonymity and forward-se...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
We describe the first efficient ring signature scheme secure, without random oracles, based on stand...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n -...
Ring signatures make it possible for a signer to anonymously and, yet, convincingly leak a secret by...