While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable to malicious signers in certain scenarios, for example, in electronic voting, malicious users will vote multiple times to achieve their own goals, which is not deserved. Traceable ring signatures (TRS) are required to be able to deal with the abuse of anonymity by malicious signers. In addition to ensure the anonymity of honest users, TRS supports to revoke the anonymity of malicious signature users and plays an important role in scenarios such as e-voting, digital currency and anonymous offline coupon service systems. Most current TRS are based on the assumptions of traditional number theory and are insecure under the attacks of quantum compu...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revoca...
A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without ...
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones r...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf ...
In this paper, a construction of a fuzzy identity-based ring signature scheme (LFIBRS) is proposed. ...
Digital signature is one of the most important cryptography primitives. Recently, more and more work...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revoca...
A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without ...
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones r...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
Deniable ring signature can be regarded as group signature without group manager, in which a singer ...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
International audienceBasing signature schemes on strong lattice problems has been a long standing o...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
First proposed in CryptoNote, a collection of popular privacy-centric cryptocurrencies have employed...
In a ring signature scheme, a user selects an arbitrary ring to be able to sign a message on behalf ...
In this paper, a construction of a fuzzy identity-based ring signature scheme (LFIBRS) is proposed. ...
Digital signature is one of the most important cryptography primitives. Recently, more and more work...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
The security of the signature scheme is destroyed because its secret information of the signature sy...
Lattice-based cryptography has known during the last decade rapid develop- ments thanks to stronger ...
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revoca...