咨询与建议

限定检索结果

文献类型

  • 26 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 19 篇 计算机科学与技术...
    • 10 篇 网络空间安全
    • 9 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 信息与通信工程
    • 7 篇 软件工程
    • 6 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 仪器科学与技术
    • 1 篇 轻工技术与工程
  • 11 篇 理学
    • 10 篇 数学
    • 3 篇 物理学
    • 2 篇 生物学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 艺术学
    • 1 篇 美术学
    • 1 篇 设计学(可授艺术学...

主题

  • 26 篇 ring signature
  • 6 篇 blockchain
  • 4 篇 proxy signature
  • 3 篇 random oracle
  • 3 篇 bilinear pairing...
  • 3 篇 threshold
  • 2 篇 data integrity
  • 2 篇 smart contract
  • 2 篇 traceability
  • 2 篇 digital signatur...
  • 2 篇 anonymity
  • 2 篇 bilinear pairing
  • 2 篇 privacy protecti...
  • 2 篇 authentication
  • 2 篇 provable data po...
  • 2 篇 identity-based c...
  • 2 篇 anonymous authen...
  • 1 篇 electric vehicle...
  • 1 篇 alliance chain
  • 1 篇 collusion-resist...

机构

  • 2 篇 beijing national...
  • 2 篇 university of no...
  • 2 篇 tsinghua univers...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 statekeylaborato...
  • 1 篇 pla institute of...
  • 1 篇 electronics and ...
  • 1 篇 key laboratory o...
  • 1 篇 state key labora...
  • 1 篇 school of scienc...
  • 1 篇 institute of ele...
  • 1 篇 school of artifi...
  • 1 篇 department of co...
  • 1 篇 unit 96610 beiji...
  • 1 篇 institute of ele...
  • 1 篇 school of comput...
  • 1 篇 institute for in...
  • 1 篇 shanghai key lab...
  • 1 篇 school of inform...

作者

  • 2 篇 xing li
  • 2 篇 yongfeng huang
  • 2 篇 yubo luo
  • 2 篇 yining qi
  • 2 篇 yin fengmei
  • 1 篇 qian-hongwu boqi...
  • 1 篇 shirase masaaki
  • 1 篇 abhinandan r pat...
  • 1 篇 jia zhenhong
  • 1 篇 gwanggil jeon
  • 1 篇 jiang wei
  • 1 篇 穆怡
  • 1 篇 yu yong li fagen...
  • 1 篇 shabana urooj
  • 1 篇 jindong zhao
  • 1 篇 zhang yingying
  • 1 篇 quan zhou
  • 1 篇 hwang jung yeon
  • 1 篇 shaozhuo li
  • 1 篇 zhang fangguo

语言

  • 26 篇 英文
检索条件"主题词=Ring signature"
26 条 记 录,以下是1-10 订阅
排序:
A Conditionally Anonymous Linkable ring signature for Blockchain Privacy Protection
收藏 引用
Computer Systems Science & Engineering 2023年 第12期47卷 2851-2867页
作者: Quan Zhou Yulong Zheng Minhui Chen Kaijun Wei School of Mathematics and Information Science Guangzhou UniversityGuangzhou510006China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China
In recent years,the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant *** ensure privacy protection for both sides of the transaction,many researchers are using ri... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Collusion-resistant convertible ring signature schemes
收藏 引用
Science China(Information Sciences) 2015年 第1期58卷 134-149页
作者: HWANG Jung Yeon CHANG Ku-Young CHO Hyun Sook SONG Boyeon SUSILO Willy Electronics and Telecommunications Research Institute(ETRI) DaejeonKorea Korea Institute of Science and Technology Information (KISTI) DaejeonKorea Centre for Computer and Information Security Research School of Computer Science and Software EngineeringUniversity of WollongongAustralia
A ring signature scheme provides signer ambiguity by hiding a signer in a ring of arbitrary members appropriately. A convertible ring signature scheme is an extension of a ring signature scheme that authenticates a si... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient Proxy ring signature Without Bilinear Pairing
收藏 引用
Chinese Journal of Electronics 2019年 第3期28卷 514-520页
作者: ZHANG Yingying ZENG Jiwen School of Science Chongqing University of Posts and Telecommunications School of Mathematical Sciences Xiamen University School of Mathematics Science Xinjiang Normal University
Proxy ring signature is a proxy signature designed to protect the privacy of the proxy signer. In this paper, we propose a new proxy ring signature based on the Schnorr’s signature. Our scheme combines the idea of th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Revocable ring signature
收藏 引用
Journal of Computer Science & Technology 2007年 第6期22卷 785-794页
作者: 廖忻宏 廖啟瑞 穆怡 Willy Susilo 王石 Department of Computer Science City University of Hong KongHong KongChina Institute for Infocomm Research(I~2R) 21 Heng Mui Keng TerraceSingapore 119613 Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of WollongongWoUongongNSW 2522Australia
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Rin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Practical Constant-Size ring signature
收藏 引用
Journal of Computer Science & Technology 2018年 第3期33卷 533-541页
作者: Meng-Jun Qin Yun-Lei Zhao Zhou-Jun Ma Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Shanghai 201203 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710126 China State Key Laboratory of Cryptology State Cryptology Administration Beijing 100878 China
Bitcoin has gained its popularity for almost 10 years as a "secure and anonymous digital currency". However, according to several recent researches, we know that it can only provide pseudonymity rather than real ano... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient ring signature Scheme Without Random Oracle from Lattices
收藏 引用
Chinese Journal of Electronics 2019年 第2期28卷 266-272页
作者: GAO Wen HU Yupu WANG Baocang CHEN Jiangshan WANG Xin College of Electrical and Information Engineering Shaanxi University of Science and Technology State Key Laboratory of Integrated Service Networks Xidian University School of Mathematics and Statistics Minnan Normal University School of Computer Science Shaanxi Normal University
Among post-quantum alternatives, latticebased cryptography is the most promising one, due to its simple operations, reduction from aver-age-case to worstcase hardness, and supporting of rich functionalities. ring sign... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A ring signature Suitable for Wireless Sensor Networks
收藏 引用
China Communications 2012年 第12期9卷 1-7页
作者: Du Yuejin Wang Yongjian National Computer Network Emergency Response Center Technical Team/Coordination Center of China Beijing 100029 P. R. China Beijing University of Posts and Telecommunications Beijing 100876 P. R. China
Wireless Sensor Network (WSN) nodes are severely limited by their power, communication bandwidth, and storage space, and the traditional signature algorithm is not suitable for WSN environments. In this paper, we pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold ring signature Scheme Based on TPM
收藏 引用
China Communications 2012年 第1期9卷 80-85页
作者: Gong Bei Jiang Wei Lin Li Li Yu Zhang Xing College of Computer Science Beijing University of Technology Beijing 100124 P. R. China Institute of Electronic Technology Information Engineering University Zhengzhou 450004 P. R. China State Key Laboratory of Information Security Institute of Sottware Chinese Academy of Sciences Beijing Beijing 100049 P. R. China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Shanghai 201204 P. R. China
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Feasibility analysis of two identity-based proxy ring signature schemes
收藏 引用
High Technology Letters 2007年 第2期13卷 207-209页
作者: 王化群 Zhang Lijun Zhao Junxi School of Information Engineering Dalian Fisheries University Dalian 116023 P.R.China College of Telecommunications & Information Engineering Nanjing University of Posts and TelecommunicationsNanjing 210003 P.R.China College of Mathematics & Physics Nanjing University of Posts and Telecommunications Nanjing 210003 P.R.China
Recently, proxy ring signature schemes have been shown to be useful in various applications, such as electronic polling, electronic payment, etc. Although many proxy ring signature schemes have been pro-posed, there a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identity-based ring signature scheme based on quadratic residues
收藏 引用
High Technology Letters 2009年 第1期15卷 94-100页
作者: 熊虎 School of Computer Science and Engineering University of Electronic Science and Technology of China
Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are const... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论