ID-Based Blind Signature and Ring Signature from Pairings

From MaRDI portal
Publication:4412819

DOI10.1007/3-540-36178-2_33zbMath1065.94566OpenAlexW1608511627MaRDI QIDQ4412819

Kwangjo Kim, Fangguo Zhang

Publication date: 16 July 2003

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-36178-2_33




Related Items (46)

A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted ServicesProvably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash systemDistributed ring signatures from general dual access structuresIdentity based linkable ring signature with logarithmic sizeUnconditionally Anonymous Controllable ID-Based Ring SignaturesA new ring signature scheme with signer-admission propertyProvably secure randomized blind signature scheme based on bilinear pairingEfficient traceable ring signature scheme without pairingsAn improved ring signature scheme without trusted key generation center for wireless sensor networkExtendable threshold ring signatures with enhanced anonymityA Provably Secure Ring Signature Scheme in Certificateless CryptographyEfficient proxy signcryption scheme with provable CCA and CMA securityTraceable Identity-Based Group SignatureCount me in! Extendability for threshold ring signaturesForward-secure ID based digital signature scheme with forward-secure private key generatorA note on an identity-based ring signature scheme with signer verifiabilityBuilding blocks of sharding blockchain systems: concepts, approaches, and open problemsIdentity-Based Blind Signature from Lattices in Standard ModelA New Efficient Threshold Ring Signature Scheme Based on Coding TheoryIdentity-based partially blind signature in the standard model for electronic cashTwo new identity-based threshold ring signature schemesCreation of identity-based digital signature schemes from bilinear mapsAnalysis and improvement of authenticatable ring signcryption schemeSelf-organized Anonymous Authentication in Mobile Ad Hoc NetworksIdentity-based ring signatures from RSAIdentity-based quotable ring signatureIndifferentiable deterministic hashing to elliptic and hyperelliptic curvesNew identity-based society oriented signature schemes from pairings on elliptic curvesA Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)An Efficient ID-Based Proxy Signature Scheme from PairingsGeneralized Identity Based and Broadcast Encryption SchemesOne-Round ID-Based Blind Signature Scheme without ROS AssumptionPolicy controlled system with anonymityCertificate-free \textit{ad hoc} anonymous authenticationAttribute-based key-insulated signature and its applicationsThreshold Privacy Preserving Keyword SearchesCertificateless threshold ring signatureCollusion-resistant convertible ring signature schemesThe ring authenticated encryption scheme-how to provide a clue wiselyAn efficient blind signature scheme based on SM2 signature algorithmRing signatures: Stronger definitions, and constructions without random oraclesFail-stop blind signature scheme design based on pairingsConverting normal DLP-based signatures into blindSeveral security schemes constructed using ECC-based self-certified public key cryptosystemsA provably secure proxy signcryption scheme using bilinear pairingsPost-quantum ID-based ring signatures from symmetric-key primitives




This page was built for publication: ID-Based Blind Signature and Ring Signature from Pairings