[[abstract]]The concept of ring signature was first introduced by Rivest et al. in 2001. Instead of revealing the actual identity of the message signer, it specifies a set of possible signers (ring members). The generated ring signature can convince any verifier that the message was indeed signed by one of the ring members; however, the real signer’s identity is totally anonymous to the verifier. However, in some applications, the actual signer may like to reduce the number of ring members of an existent ring signature. For instance, suppose that Bob is a member of the cabinet, and that Bob wishes to leak a juicy fact to a journalist. Then, Bob can send the story to the journalist through a ring signature scheme that names each cabinet memb...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the ...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealin...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Controllable ring signatures and its application to E-prosecution This paper introduces a new concep...
A ring signature scheme allows the signer to sign on behalf of an ad hoc set of users, called a ring...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
Abstract. Ring signatures and group signatures are prominent cryptographic primitives offering a com...
A ring signature scheme provides signer ambiguity by hiding a signer in a ring of arbitrary members ...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the ...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow...
Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealin...
Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so ...
Controllable ring signatures and its application to E-prosecution This paper introduces a new concep...
A ring signature scheme allows the signer to sign on behalf of an ad hoc set of users, called a ring...
A ring signature is a cryptographic primitive that enables a signer to produce a signature without r...
Abstract. Ring signatures and group signatures are prominent cryptographic primitives offering a com...
A ring signature scheme provides signer ambiguity by hiding a signer in a ring of arbitrary members ...
This paper presents a new kind of (k,n)-threshold ring signature ((k,n)-ring signature) which is jus...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
AbstractRecently, Herranz presented an identity-based ring signature scheme featuring signer verifia...
Abstract. In this paper we formalize the notion of a ring signature, which makes it possible to spec...
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the ...
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable t...