ID-Based Blind Signature and Ring Signature from Pairings
From MaRDI portal
Publication:4412819
DOI10.1007/3-540-36178-2_33zbMath1065.94566OpenAlexW1608511627MaRDI QIDQ4412819
Publication date: 16 July 2003
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36178-2_33
Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Related Items (46)
A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted Services ⋮ Provably secure pairing-free identity-based partially blind signature scheme and its application in online E-cash system ⋮ Distributed ring signatures from general dual access structures ⋮ Identity based linkable ring signature with logarithmic size ⋮ Unconditionally Anonymous Controllable ID-Based Ring Signatures ⋮ A new ring signature scheme with signer-admission property ⋮ Provably secure randomized blind signature scheme based on bilinear pairing ⋮ Efficient traceable ring signature scheme without pairings ⋮ An improved ring signature scheme without trusted key generation center for wireless sensor network ⋮ Extendable threshold ring signatures with enhanced anonymity ⋮ A Provably Secure Ring Signature Scheme in Certificateless Cryptography ⋮ Efficient proxy signcryption scheme with provable CCA and CMA security ⋮ Traceable Identity-Based Group Signature ⋮ Count me in! Extendability for threshold ring signatures ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ A note on an identity-based ring signature scheme with signer verifiability ⋮ Building blocks of sharding blockchain systems: concepts, approaches, and open problems ⋮ Identity-Based Blind Signature from Lattices in Standard Model ⋮ A New Efficient Threshold Ring Signature Scheme Based on Coding Theory ⋮ Identity-based partially blind signature in the standard model for electronic cash ⋮ Two new identity-based threshold ring signature schemes ⋮ Creation of identity-based digital signature schemes from bilinear maps ⋮ Analysis and improvement of authenticatable ring signcryption scheme ⋮ Self-organized Anonymous Authentication in Mobile Ad Hoc Networks ⋮ Identity-based ring signatures from RSA ⋮ Identity-based quotable ring signature ⋮ Indifferentiable deterministic hashing to elliptic and hyperelliptic curves ⋮ New identity-based society oriented signature schemes from pairings on elliptic curves ⋮ A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) ⋮ An Efficient ID-Based Proxy Signature Scheme from Pairings ⋮ Generalized Identity Based and Broadcast Encryption Schemes ⋮ One-Round ID-Based Blind Signature Scheme without ROS Assumption ⋮ Policy controlled system with anonymity ⋮ Certificate-free \textit{ad hoc} anonymous authentication ⋮ Attribute-based key-insulated signature and its applications ⋮ Threshold Privacy Preserving Keyword Searches ⋮ Certificateless threshold ring signature ⋮ Collusion-resistant convertible ring signature schemes ⋮ The ring authenticated encryption scheme-how to provide a clue wisely ⋮ An efficient blind signature scheme based on SM2 signature algorithm ⋮ Ring signatures: Stronger definitions, and constructions without random oracles ⋮ Fail-stop blind signature scheme design based on pairings ⋮ Converting normal DLP-based signatures into blind ⋮ Several security schemes constructed using ECC-based self-certified public key cryptosystems ⋮ A provably secure proxy signcryption scheme using bilinear pairings ⋮ Post-quantum ID-based ring signatures from symmetric-key primitives
This page was built for publication: ID-Based Blind Signature and Ring Signature from Pairings