The following pages link to (Q4409137):
Displayed 36 items.
- Unconditionally anonymous ring and mesh signatures (Q321307) (← links)
- A multivariate based threshold ring signature scheme (Q371251) (← links)
- An efficient ring signature scheme from pairings (Q528720) (← links)
- Certificate-free \textit{ad hoc} anonymous authentication (Q726164) (← links)
- Certificateless threshold ring signature (Q730948) (← links)
- A new ring signature scheme with signer-admission property (Q867649) (← links)
- Hidden attribute-based signatures without anonymity revocation (Q975862) (← links)
- The ring authenticated encryption scheme-how to provide a clue wisely (Q1007859) (← links)
- Ring signatures: Stronger definitions, and constructions without random oracles (Q1027973) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- Identity-based quotable ring signature (Q1750014) (← links)
- Policy controlled system with anonymity (Q1786597) (← links)
- Threshold ring signatures: new definitions and post-quantum security (Q2055701) (← links)
- Compressing proofs of \(k\)-out-of-\(n\) partial knowledge (Q2139628) (← links)
- Stronger notions and a more efficient construction of threshold ring signatures (Q2146104) (← links)
- One-time traceable ring signatures (Q2148766) (← links)
- Logarithmic-size ring signatures with tight security from the DDH assumption (Q2167754) (← links)
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model (Q2170058) (← links)
- Efficient traceable ring signature scheme without pairings (Q2176288) (← links)
- Two new identity-based threshold ring signature schemes (Q2447763) (← links)
- Identity-based ring signatures from RSA (Q2465630) (← links)
- Collusion-resistant convertible ring signature schemes (Q2515459) (← links)
- Cryptanalysis of multivariate threshold ring signature schemes (Q2681401) (← links)
- Non-interactive composition of sigma-protocols via Share-then-Hash (Q2691604) (← links)
- Acyclicity programming for sigma-protocols (Q2695643) (← links)
- Short Attribute-Based Signatures for Threshold Predicates (Q2889994) (← links)
- How to Leak a Secret and Reap the Rewards Too (Q2946484) (← links)
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography (Q3503873) (← links)
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory (Q3535347) (← links)
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) (Q4933219) (← links)
- Extendable threshold ring signatures with enhanced anonymity (Q6070763) (← links)
- Multi-signatures for ECDSA and its applications in blockchain (Q6108787) (← links)
- Efficient proofs of knowledge for threshold relations (Q6109456) (← links)
- Count me in! Extendability for threshold ring signatures (Q6113963) (← links)
- Logarithmic-size (linkable) threshold ring signatures in the plain model (Q6113965) (← links)
- Threshold signatures with private accountability (Q6166965) (← links)