Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p. 55-57).Ring Signatures were developed by Rivest, Shamir and Tauman, in a paper titled How to Leak a Secret, as a cryptographically secure way to authenticate messages with respect to ad-hoc groups while still maintaining the signer's anonymity. While their initial scheme assumed the existence of random oracles, in 2005 a scheme was developed that does not use random oracles and meets the strongest security definitions known in the literature. We argue that this scheme is not deniable, meaning if someone signs a message with respect to a ring of possible signers, and at a later time the s...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
[[abstract]]The strong designated verifier ring signature scheme provides signer anonymity to protec...
Blind signatures are a useful ingredient to design secure sophisticated systems like electronic voti...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
We propose Designated-Verifier Linkable Ring Signatures with unconditional anonymity, a cryptographi...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
[[abstract]]The first strong designated-verifier ring signature scheme provides signer ambiguity to ...
AbstractA conditionally anonymous ring signature is an exception since the anonymity is conditional....
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
The proposal presented in this thesis represents an expansion of the original concept of ring signat...
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the ...
Ring signatures and group signatures are prominent cryptographic primitives offering a combination o...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
[[abstract]]The strong designated verifier ring signature scheme provides signer anonymity to protec...
Blind signatures are a useful ingredient to design secure sophisticated systems like electronic voti...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
We propose Designated-Verifier Linkable Ring Signatures with unconditional anonymity, a cryptographi...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
[[abstract]]The first strong designated-verifier ring signature scheme provides signer ambiguity to ...
AbstractA conditionally anonymous ring signature is an exception since the anonymity is conditional....
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
The proposal presented in this thesis represents an expansion of the original concept of ring signat...
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the ...
Ring signatures and group signatures are prominent cryptographic primitives offering a combination o...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
[[abstract]]The strong designated verifier ring signature scheme provides signer anonymity to protec...
Blind signatures are a useful ingredient to design secure sophisticated systems like electronic voti...