Two new identity-based threshold ring signature schemes

Dr Research Foundation of Guizhou Normal University of Guizhou Province, P.R. China; Science and Technology Foundation of Guizhou Province, P.R. China [LKS[2013]02]

[1]  Joseph K. Liu,et al.  A Separable Threshold Ring Signature Scheme , 2003, ICISC.

[2]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Siu-Ming Yiu,et al.  Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..

[5]  Joseph K. Liu,et al.  Separable Linkable Threshold Ring Signatures , 2004, INDOCRYPT.

[6]  Joseph K. Liu,et al.  Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups , 2004, ESAS.

[7]  Tsz Hon Yuen,et al.  Escrowed Linkability of Ring Signatures and Its Applications , 2006, VIETCRYPT.

[8]  Siu-Ming Yiu,et al.  Identity Based Ring Signature: Why, How and What Next , 2005, EuroPKI.

[9]  Lan Nguyen,et al.  Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.

[10]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[11]  Siu-Ming Yiu,et al.  Efficient Identity Based Ring Signature , 2005, ACNS.

[12]  Tsz Hon Yuen,et al.  Ring signatures without random oracles , 2006, ASIACCS '06.

[13]  Jacques Stern,et al.  Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.

[14]  Jonathan Katz,et al.  Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..

[15]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[16]  Javier Herranz Identity-based ring signatures from RSA , 2007, Theor. Comput. Sci..

[17]  Hovav Shacham,et al.  Efficient Ring Signatures Without Random Oracles , 2007, Public Key Cryptography.

[18]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[19]  Yu-Fang Chung,et al.  A Novel ID-based Threshold Ring Signature Scheme competent for Anonymity and Anti-forgery , 2006, 2006 International Conference on Computational Intelligence and Security.

[20]  Xiong Hu,et al.  Identity-based threshold ring signature without pairings , 2008, 2008 International Conference on Communications, Circuits and Systems.