A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
From MaRDI portal
Publication:3535347
DOI10.1007/978-3-540-88403-3_1zbMATH Open1177.94178OpenAlexW2180059702MaRDI QIDQ3535347FDOQ3535347
Authors: Carlos Aguilar-Melchor, Pierre-Louis Cayrel, Philippe Gaborit
Publication date: 11 November 2008
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88403-3_1
Recommendations
Cites Work
- Security proofs for signature schemes
- How to share a secret
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- The intractability of computing the minimum distance of a code
- A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
- On the inherent intractability of certain coding problems (Corresp.)
- Title not available (Why is that?)
- Group Signatures
- A new paradigm for public key identification
- Title not available (Why is that?)
- Mesh Signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- 1-out-of-n Signatures from a Variety of Keys
- Advances in Cryptology - EUROCRYPT 2004
- Ring Signatures of Sub-linear Size Without Random Oracles
- Progress in Cryptology - INDOCRYPT 2003
- Efficient Ring Signatures Without Random Oracles
- A new identification scheme based on syndrome decoding
- ID-Based Blind Signature and Ring Signature from Pairings
- Theory of Cryptography
- Information Security and Cryptology - ICISC 2003
- Limit distribution of the minimum distance of random linear codes
- Progress in Cryptology - INDOCRYPT 2004
Cited In (14)
- A lattice-based threshold ring signature scheme
- Zero-knowledge proofs for committed symmetric Boolean functions
- Extendable threshold ring signatures with enhanced anonymity
- Group encryption: full dynamicity, message filtering and code-based instantiation
- A zero-knowledge identification scheme based on the \(q\)-ary syndrome decoding problem
- Certificate-free \textit{ad hoc} anonymous authentication
- A traceable ring signature scheme based on coding theory
- An improved threshold ring signature scheme based on error correcting codes
- Group encryption: full dynamicity, message filtering and code-based instantiation
- Information Security and Privacy
- Non-interactive composition of sigma-protocols via Share-then-Hash
- Improved lattice-based threshold ring signature scheme
- Cryptanalysis of multivariate threshold ring signature schemes
- Provably Secure Code-Based Threshold Ring Signatures
Uses Software
This page was built for publication: A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3535347)