ID-based ring signature on prime order group from asymmetric pairing
For the problem that the security proof was difficult to be realized under the standard model in the existing ID-based ring signature schemes, an ID-based ring signature scheme proven secure in the standard model was proposed.Firstly, the formal definitions of security model and adversary model of I...
Saved in:
Main Authors: | Hongxia HOU, Mingrui ZHANG, Yanqi ZHAO, Xiaoli DONG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2021-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021159/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Survey on ring signature
by: ZHANG Guo-yin, et al.
Published: (2007-01-01) -
On prime and semiprime near-rings with derivations
by: Nurcan Argaç
Published: (1997-01-01) -
Threshold ring signature for wireless sensor networks
by: Jun-fang XIAO, et al.
Published: (2012-03-01) -
Centralizer on Lie-ideal of Semi-prime Inverse Semi-ring
by: Ali JA. Abass, et al.
Published: (2025-01-01) -
ID-based signature without trusted PKG
by: ZHOU Liang1, et al.
Published: (2008-01-01)