Identity-Based Linkable Ring Signature Scheme
暂无分享,去创建一个
[1] Yunlei Zhao,et al. Practical Constant-Size Ring Signature , 2018, Journal of Computer Science and Technology.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Tsz Hon Yuen,et al. Escrowed Linkability of Ring Signatures and Its Applications , 2006, VIETCRYPT.
[4] Joseph K. Liu,et al. Separable Linkable Threshold Ring Signatures , 2004, INDOCRYPT.
[5] Lunzhi Deng,et al. Two new identity-based threshold ring signature schemes , 2014, Theor. Comput. Sci..
[6] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[7] Xavier Boyen,et al. Forward-Secure Linkable Ring Signatures , 2018, ACISP.
[8] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[9] Eiichiro Fujisaki. Sub-linear Size Traceable Ring Signatures without Random Oracles , 2011, CT-RSA.
[10] Victor K.-W. Wei,et al. Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation , 2005, ISPEC.
[11] Sherali Zeadally,et al. Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures , 2016, IEEE Transactions on Information Forensics and Security.
[12] Yi Mu,et al. Identity-based quotable ring signature , 2015, Inf. Sci..
[13] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[14] Jianhua Li,et al. Linkable Ring Signatures from Linear Feedback Shift Register , 2007, EUC Workshops.
[15] Xiaolei Dong,et al. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols , 2018, Comput. J..
[16] Tsz Hon Yuen,et al. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction , 2013, Theor. Comput. Sci..
[17] Javier Herranz. Identity-based ring signatures from RSA , 2007, Theor. Comput. Sci..
[18] Tsz Hon Yuen,et al. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles , 2013, Comput. J..
[19] Sabine Oechsner,et al. Towards Practical Lattice-Based One-Time Linkable Ring Signatures , 2018, IACR Cryptol. ePrint Arch..
[20] Joseph K. Liu,et al. Linkable Ring Signature with Unconditional Anonymity , 2014, IEEE Transactions on Knowledge and Data Engineering.
[21] Dong Hoon Lee,et al. Analysis of Revocable-iff-Linked Ring Signature Scheme , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[22] Tsz Hon Yuen,et al. Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature , 2006, INDOCRYPT.
[23] Dong Hoon Lee,et al. Ring Signature with Weak Linkability and Its Applications , 2008, IEEE Transactions on Knowledge and Data Engineering.
[24] Qiong Huang,et al. Leakage-resilient ring signature schemes , 2019, Theor. Comput. Sci..
[25] Joseph K. Liu,et al. Linkable Ring Signatures: Security Models and New Schemes , 2005, ICCSA.
[26] Joseph K. Liu,et al. A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) , 2010, ProvSec.
[27] Siu-Ming Yiu,et al. Efficient Identity Based Ring Signature , 2005, ACNS.