A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without revealing the definite signer identify, but this also leads to the abuse of anonymity by malicious signers, which can be prevented by traceable ring signatures (TRS). Up until that point, traceable ring signatures have been secure based on the difficult problem of number-theoretic (discrete logarithms or RSA), but since the advent of quantum computers, traditional traceable ring signatures may no longer be secure. Thus Feng proposed a lattice based TRS, which are resistant to attacks by quantum computers. However, that works did not tackle the certificate management problem. To close this gap, a quantum-resistant certificateless TRS scheme wa...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
We construct efficient ring signatures (RS) from isogeny and lattice assumptions. Our ring signature...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
With the help of multi-signature technology, multiple signatures on the same message could be compre...
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf ...
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which en...
In order to solve the problem of large key size and low efficiency in the linkable ring signature sc...
Ring signature is a kind of digital signature which can protect the identity of the signer. Certific...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Unique ring signatures (URS) were introduced by Franklin and Zhang (FC 2012) as a unification of lin...
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones r...
In this paper, we construct an anonymous and decentralized cryptocash protocol which is secure in th...
We construct efficient ring signatures (RS) from isogeny and lattice assumptions. Our ring signature...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
We construct efficient ring signatures (RS) from isogeny and lattice assumptions. Our ring signature...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
With the help of multi-signature technology, multiple signatures on the same message could be compre...
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf ...
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS) scheme, which en...
In order to solve the problem of large key size and low efficiency in the linkable ring signature sc...
Ring signature is a kind of digital signature which can protect the identity of the signer. Certific...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
Unique ring signatures (URS) were introduced by Franklin and Zhang (FC 2012) as a unification of lin...
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones r...
In this paper, we construct an anonymous and decentralized cryptocash protocol which is secure in th...
We construct efficient ring signatures (RS) from isogeny and lattice assumptions. Our ring signature...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
We construct efficient ring signatures (RS) from isogeny and lattice assumptions. Our ring signature...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...