Information Security Practice and Experience
From MaRDI portal
Publication:5316510
DOI10.1007/b107167zbMath1118.68486OpenAlexW2009160370MaRDI QIDQ5316510
Patrick P. Tsang, Victor K. Wei
Publication date: 13 September 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b107167
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (14)
Revocable and Linkable Ring Signature ⋮ Stronger notions and a more efficient construction of threshold ring signatures ⋮ Unconditionally Anonymous Controllable ID-Based Ring Signatures ⋮ Efficient traceable ring signature scheme without pairings ⋮ On tightly-secure (linkable) ring signatures ⋮ Designated-verifier linkable ring signatures with unconditional anonymity ⋮ DualDory: logarithmic-verifier linkable ring signatures through preprocessing ⋮ Logarithmic-size (linkable) threshold ring signatures in the plain model ⋮ A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) ⋮ Sub-linear Size Traceable Ring Signatures without Random Oracles ⋮ On the Portability of Generalized Schnorr Proofs ⋮ Public-key quantum signature for classical messages without third-party verification ⋮ Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages ⋮ Designated-verifier linkable ring signatures
This page was built for publication: Information Security Practice and Experience