Two new identity-based threshold ring signature schemes
暂无分享,去创建一个
[1] Joseph K. Liu,et al. A Separable Threshold Ring Signature Scheme , 2003, ICISC.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Siu-Ming Yiu,et al. Identity Based Threshold Ring Signature , 2004, IACR Cryptol. ePrint Arch..
[5] Joseph K. Liu,et al. Separable Linkable Threshold Ring Signatures , 2004, INDOCRYPT.
[6] Joseph K. Liu,et al. Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups , 2004, ESAS.
[7] Tsz Hon Yuen,et al. Escrowed Linkability of Ring Signatures and Its Applications , 2006, VIETCRYPT.
[8] Siu-Ming Yiu,et al. Identity Based Ring Signature: Why, How and What Next , 2005, EuroPKI.
[9] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[10] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[11] Siu-Ming Yiu,et al. Efficient Identity Based Ring Signature , 2005, ACNS.
[12] Tsz Hon Yuen,et al. Ring signatures without random oracles , 2006, ASIACCS '06.
[13] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[14] Jonathan Katz,et al. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..
[15] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[16] Javier Herranz. Identity-based ring signatures from RSA , 2007, Theor. Comput. Sci..
[17] Hovav Shacham,et al. Efficient Ring Signatures Without Random Oracles , 2007, Public Key Cryptography.
[18] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[19] Yu-Fang Chung,et al. A Novel ID-based Threshold Ring Signature Scheme competent for Anonymity and Anti-forgery , 2006, 2006 International Conference on Computational Intelligence and Security.
[20] Xiong Hu,et al. Identity-based threshold ring signature without pairings , 2008, 2008 International Conference on Communications, Circuits and Systems.