Traceable Identity-Based Ring Signature for Protecting Mobile IoT Devices
暂无分享,去创建一个
Xin Peng | Wenbin Zhang | Ke Gu | Zhenlin Liu
[1] Paulo Mateus,et al. A Traceable Ring Signature Scheme based on Coding Theory , 2019, IACR Cryptol. ePrint Arch..
[2] Tsz Hon Yuen,et al. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction , 2013, Theor. Comput. Sci..
[3] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[4] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[5] Jianhua Li,et al. Linkable Ring Signatures from Linear Feedback Shift Register , 2007, EUC Workshops.
[6] Md. Zakirul Alam Bhuiyan,et al. A secure data deletion scheme for IoT devices through key derivation encryption and data analysis , 2020, Future Gener. Comput. Syst..
[7] Eiichiro Fujisaki. Sub-linear Size Traceable Ring Signatures without Random Oracles , 2011, CT-RSA.
[8] Joseph K. Liu,et al. Linkable Ring Signatures: Security Models and New Schemes , 2005, ICCSA.
[9] Koutarou Suzuki,et al. Traceable Ring Signature , 2007, Public Key Cryptography.
[10] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[11] Ke Gu,et al. Efficient traceable ring signature scheme without pairings , 2020, Adv. Math. Commun..