The following pages link to (Q4474199):
Displaying 50 items.
- Policy-based signature scheme from lattices (Q306050) (← links)
- Unconditionally anonymous ring and mesh signatures (Q321307) (← links)
- Efficient democratic group signatures with threshold traceability (Q407480) (← links)
- Two extensions of the ring signature scheme of Rivest-Shamir-Taumann (Q454971) (← links)
- An efficient ring signature scheme from pairings (Q528720) (← links)
- An ID-based multi-signer universal designated multi-verifier signature scheme (Q549664) (← links)
- An improved ring signature scheme without trusted key generation center for wireless sensor network (Q615215) (← links)
- A note on an identity-based ring signature scheme with signer verifiability (Q627180) (← links)
- Analysis and improvement of authenticatable ring signcryption scheme (Q655118) (← links)
- An efficient conditionally anonymous ring signature in the random oracle model (Q690468) (← links)
- Certificate-free \textit{ad hoc} anonymous authentication (Q726164) (← links)
- Certificateless threshold ring signature (Q730948) (← links)
- Multi-designated verifiers signatures: anonymity without encryption (Q845986) (← links)
- A new ring signature scheme with signer-admission property (Q867649) (← links)
- Identity-based chameleon hashing and signatures without key exposure (Q903661) (← links)
- Hidden attribute-based signatures without anonymity revocation (Q975862) (← links)
- The ring authenticated encryption scheme-how to provide a clue wisely (Q1007859) (← links)
- New approaches for deniable authentication (Q1037236) (← links)
- Leakage-resilient ring signature schemes (Q1711836) (← links)
- Identity-based quotable ring signature (Q1750014) (← links)
- Policy controlled system with anonymity (Q1786597) (← links)
- Private authentication (Q1881255) (← links)
- A certificateless ring signature scheme with high efficiency in the random oracle model (Q1993131) (← links)
- Traceable ring signatures: general framework and post-quantum security (Q2034982) (← links)
- Compact designated verifier NIZKs from the CDH assumption without pairings (Q2051369) (← links)
- Signatures from sequential-OR proofs (Q2055653) (← links)
- Threshold ring signatures: new definitions and post-quantum security (Q2055701) (← links)
- Privacy-preserving authenticated key exchange and the case of IKEv2 (Q2055708) (← links)
- Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme (Q2056805) (← links)
- LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks (Q2057153) (← links)
- Two-party adaptor signatures from identification schemes (Q2061930) (← links)
- Covert authentication from lattices (Q2096622) (← links)
- Efficient and tight oblivious transfer from PKE with tight multi-user security (Q2096634) (← links)
- Post-quantum ID-based ring signatures from symmetric-key primitives (Q2096649) (← links)
- Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages (Q2104242) (← links)
- Designated-verifier linkable ring signatures (Q2104415) (← links)
- A novel quantum ring signature scheme without using entangled states (Q2107093) (← links)
- DualRing: generic construction of ring signatures with efficient instantiations (Q2120078) (← links)
- Compact ring signatures from learning with errors (Q2120080) (← links)
- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version (Q2120989) (← links)
- SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions (Q2128577) (← links)
- Compressing proofs of \(k\)-out-of-\(n\) partial knowledge (Q2139628) (← links)
- SoK: securing email -- a stakeholder-based analysis (Q2145401) (← links)
- Stronger notions and a more efficient construction of threshold ring signatures (Q2146104) (← links)
- One-time traceable ring signatures (Q2148766) (← links)
- Report and trace ring signatures (Q2149823) (← links)
- Identity based linkable ring signature with logarithmic size (Q2151286) (← links)
- Logarithmic-size ring signatures with tight security from the DDH assumption (Q2167754) (← links)
- Group signatures and more from isogenies and lattices: generic, simple, and efficient (Q2170040) (← links)
- Stacking sigmas: a framework to compose \(\varSigma\)-protocols for disjunctions (Q2170057) (← links)