scientific article; zbMATH DE number 2081086
From MaRDI portal
Publication:4474199
zbMATH Open1064.94558MaRDI QIDQ4474199FDOQ4474199
Authors: Ronald L. Rivest, Adi Shamir, Yael Tauman
Publication date: 4 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480552.htm
Title of this publication is not available (Why is that?)
Recommendations
signature schemegroup signature schemedesignated verifier signature schemering signature schemesigner-ambiguous signature scheme
Cited In (only showing first 100 items - show all)
- Electronic voting scheme based on a quantum ring signature
- Ring signatures with user-controlled linkability
- Privacy-preserving authenticated key exchange and the case of IKEv2
- An efficient conditionally anonymous ring signature in the random oracle model
- Computational and symbolic anonymity in an unbounded network
- A certificateless ring signature scheme with high efficiency in the random oracle model
- Efficient democratic group signatures with threshold traceability
- Designated-verifier linkable ring signatures with unconditional anonymity
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
- Certificateless threshold ring signature
- Two new identity-based threshold ring signature schemes
- Revocable and linkable ring signature
- Escrow free attribute-based signature with self-revealability
- DualDory: logarithmic-verifier linkable ring signatures through preprocessing
- Multi-designated verifiers signatures: anonymity without encryption
- Identity-based quotable ring signature
- The ring authenticated encryption scheme-how to provide a clue wisely
- Certificate-free \textit{ad hoc} anonymous authentication
- Efficient lattice-based traceable ring signature scheme with its application in blockchain
- Private authentication
- A note on the post-quantum security of (ring) signatures
- Certificateless ring signature based on RSA problem and DL problem
- Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes
- Policy-based signature scheme from lattices
- Sub-linear size traceable ring signatures without random oracles
- Short attribute-based signatures for threshold predicates
- Efficient traceable ring signature scheme without pairings
- Mesh Signatures
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Two extensions of the ring signature scheme of Rivest-Shamir-Taumann
- How to share a secret with cheaters
- Threshold ring signatures: new definitions and post-quantum security
- Post-quantum ID-based ring signatures from symmetric-key primitives
- An improved ring signature scheme without trusted key generation center for wireless sensor network
- A new ring signature scheme with signer-admission property
- Unconditionally anonymous ring and mesh signatures
- Tightly secure ring signatures in the standard model
- Designated-verifier linkable ring signatures
- DualRing: generic construction of ring signatures with efficient instantiations
- Progress in Cryptology - INDOCRYPT 2003
- Traceable ring signatures: general framework and post-quantum security
- Policy controlled system with anonymity
- Efficient and tight oblivious transfer from PKE with tight multi-user security
- Decentralized attribute-based signatures
- A secure anonymous proxy signcryption scheme
- A note on an identity-based ring signature scheme with signer verifiability
- Identity-based chameleon hashing and signatures without key exposure
- How to Leak a Secret and Reap the Rewards Too
- A generic framework for accountable optimistic fair exchange protocol
- On tightly-secure (linkable) ring signatures
- Identity based linkable ring signature with logarithmic size
- Strongly unforgeable ring signature scheme from lattices in the standard model
- How to share a secret
- Attribute-based signatures
- Ring signature scheme based on multivariate public key cryptosystems
- Hidden attribute-based signatures without anonymity revocation
- Self-organized anonymous authentication in mobile ad hoc networks
- Compact Ring Signature in the Standard Model for Blockchain
- Generalized Identity Based and Broadcast Encryption Schemes
- Analysis and improvement of authenticatable ring signcryption scheme
- Stronger notions and a more efficient construction of threshold ring signatures
- New approaches for deniable authentication
- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
- Efficient fully structure-preserving signatures and shrinking commitments
- An ID-based multi-signer universal designated multi-verifier signature scheme
- Identity-based ring signatures from RSA
- A Provably Secure Ring Signature Scheme in Certificateless Cryptography
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- Leakage-resilient ring signature schemes
- Unconditionally Anonymous Controllable ID-Based Ring Signatures
- Anonymous Proxy Signatures
- An efficient ring signature scheme from pairings
- Non-interactive blind signatures for random messages
- Anonymous authenticated communication
- YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model
- Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
- A novel quantum ring signature scheme without using entangled states
- Bicameral and auditably private signatures
- Compressing proofs of \(k\)-out-of-\(n\) partial knowledge
- RingRainbow -- an efficient multivariate ring signature scheme
- Compact accountable ring signatures in the plain model
- Compact ring signatures with post-quantum security in standard model
- Extendable threshold ring signatures with enhanced anonymity
- SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions
- Logarithmic-size ring signatures with tight security from the DDH assumption
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Improving the efficiency of report and trace ring signatures
- It wasn't me! Repudiability and claimability of ring signatures
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
- A new lattice-based online/offline signatures framework for low-power devices
- Group encryption: full dynamicity, message filtering and code-based instantiation
- Threshold signatures with private accountability
- Linkable ring signature scheme with stronger security guarantees
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Adding Linkability to Ring Signatures with One-Time Signatures
- Logarithmic-size (linkable) threshold ring signatures in the plain model
- Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)
- Universal ring signatures in the standard model
- Forward-Secure Group Signatures from Pairings
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4474199)