In this paper, a construction of a fuzzy identity-based ring signature scheme (LFIBRS) is proposed. Our LFIBRS combines the characteristics of both the fuzzy identity-based signature (FIBS) and the ring signature. On the one hand, a signature issued under an identity ID can be verified by any identity ID′ that is “close enough” to the identity ID. Since biometric identification is the well-known most popular and reliable identification method, our LFIBRS can be applied in such a situation whenever it is required for official audit or supervision that the signer’s real identity is needed to be authenticated. On the other hand, LFIBRS provides anonymity under the random oracle model. In addition, LFIBRS provides unforgeability under the small...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive ...
A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature t...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
Digital signature is one of the most important cryptography primitives. Recently, more and more work...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf ...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without ...
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones r...
AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on ...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Part 7: Identity ManagementInternational audienceIdentity-based signature is an important technique ...
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which en...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive ...
A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature t...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
Digital signature is one of the most important cryptography primitives. Recently, more and more work...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf ...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without ...
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones r...
AbstractShamir proposed in 1984 the first identity-based signature scheme, whose security relies on ...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Part 7: Identity ManagementInternational audienceIdentity-based signature is an important technique ...
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which en...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-base...
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive ...