咨询与建议

限定检索结果

文献类型

  • 26 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 12 篇 计算机科学与技术...
    • 11 篇 网络空间安全
    • 4 篇 软件工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 轻工技术与工程
  • 4 篇 理学
    • 3 篇 数学
    • 1 篇 物理学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 美术学
    • 1 篇 设计学(可授艺术学...

主题

  • 26 篇 ring signature
  • 6 篇 blockchain
  • 4 篇 proxy signature
  • 3 篇 threshold
  • 3 篇 random oracle
  • 3 篇 bilinear pairing...
  • 2 篇 data integrity
  • 2 篇 bilinear pairing
  • 2 篇 privacy protecti...
  • 2 篇 authentication
  • 2 篇 provable data po...
  • 2 篇 smart contract
  • 2 篇 traceability
  • 2 篇 identity-based c...
  • 2 篇 anonymous authen...
  • 2 篇 digital signatur...
  • 2 篇 anonymity
  • 1 篇 electric vehicle...
  • 1 篇 alliance chain
  • 1 篇 chinese remainde...

机构

  • 2 篇 beijing national...
  • 2 篇 university of no...
  • 2 篇 tsinghua univers...
  • 1 篇 state key labora...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 school of comput...
  • 1 篇 statekeylaborato...
  • 1 篇 korea institute ...
  • 1 篇 pla institute of...
  • 1 篇 electronics and ...
  • 1 篇 school of mathem...
  • 1 篇 school of inform...
  • 1 篇 dept. of electro...
  • 1 篇 key laboratory o...
  • 1 篇 north china univ...
  • 1 篇 state key labora...
  • 1 篇 zhengzhou scienc...
  • 1 篇 college of mathe...
  • 1 篇 school of scienc...

作者

  • 2 篇 yubo luo
  • 2 篇 yining qi
  • 2 篇 yin fengmei
  • 2 篇 xing li
  • 2 篇 yongfeng huang
  • 1 篇 pu guangning
  • 1 篇 qian-hongwu boqi...
  • 1 篇 shirase masaaki
  • 1 篇 abhinandan r pat...
  • 1 篇 jia zhenhong
  • 1 篇 gwanggil jeon
  • 1 篇 jiang wei
  • 1 篇 yulong zheng
  • 1 篇 meng-jun qin
  • 1 篇 郎为民
  • 1 篇 cho hyun sook
  • 1 篇 廖忻宏
  • 1 篇 zhou-jun ma
  • 1 篇 wang baocang
  • 1 篇 yun-lei zhao

语言

  • 24 篇 英文
  • 2 篇 中文
检索条件"主题词=Ring signature"
26 条 记 录,以下是1-10 订阅
排序:
Collusion-resistant convertible ring signature schemes
收藏 引用
Science China(Information Sciences) 2015年 第1期58卷 134-149页
作者: HWANG Jung Yeon CHANG Ku-Young CHO Hyun Sook SONG Boyeon SUSILO Willy Electronics and Telecommunications Research Institute(ETRI) DaejeonKorea Korea Institute of Science and Technology Information (KISTI) DaejeonKorea Centre for Computer and Information Security Research School of Computer Science and Software EngineeringUniversity of WollongongAustralia
A ring signature scheme provides signer ambiguity by hiding a signer in a ring of arbitrary members appropriately. A convertible ring signature scheme is an extension of a ring signature scheme that authenticates a si... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient Proxy ring signature Without Bilinear Pairing
收藏 引用
Chinese Journal of Electronics 2019年 第3期28卷 514-520页
作者: ZHANG Yingying ZENG Jiwen School of Science Chongqing University of Posts and Telecommunications School of Mathematical Sciences Xiamen University School of Mathematics Science Xinjiang Normal University
Proxy ring signature is a proxy signature designed to protect the privacy of the proxy signer. In this paper, we propose a new proxy ring signature based on the Schnorr’s signature. Our scheme combines the idea of th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Revocable ring signature
收藏 引用
Journal of Computer Science & Technology 2007年 第6期22卷 785-794页
作者: 廖忻宏 廖啟瑞 穆怡 Willy Susilo 王石 Department of Computer Science City University of Hong KongHong KongChina Institute for Infocomm Research(I~2R) 21 Heng Mui Keng TerraceSingapore 119613 Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of WollongongWoUongongNSW 2522Australia
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Rin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Practical Constant-Size ring signature
收藏 引用
Journal of Computer Science & Technology 2018年 第3期33卷 533-541页
作者: Meng-Jun Qin Yun-Lei Zhao Zhou-Jun Ma Shanghai Key Laboratory of Data Science School of Computer Science Fudan University Shanghai 201203 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710126 China State Key Laboratory of Cryptology State Cryptology Administration Beijing 100878 China
Bitcoin has gained its popularity for almost 10 years as a "secure and anonymous digital currency". However, according to several recent researches, we know that it can only provide pseudonymity rather than real ano... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient ring signature Scheme Without Random Oracle from Lattices
收藏 引用
Chinese Journal of Electronics 2019年 第2期28卷 266-272页
作者: GAO Wen HU Yupu WANG Baocang CHEN Jiangshan WANG Xin College of Electrical and Information Engineering Shaanxi University of Science and Technology State Key Laboratory of Integrated Service Networks Xidian University School of Mathematics and Statistics Minnan Normal University School of Computer Science Shaanxi Normal University
Among post-quantum alternatives, latticebased cryptography is the most promising one, due to its simple operations, reduction from aver-age-case to worstcase hardness, and supporting of rich functionalities. ring sign... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Feasibility analysis of two identity-based proxy ring signature schemes
收藏 引用
High Technology Letters 2007年 第2期13卷 207-209页
作者: 王化群 Zhang Lijun Zhao Junxi School of Information Engineering Dalian Fisheries University Dalian 116023 P.R.China College of Telecommunications & Information Engineering Nanjing University of Posts and TelecommunicationsNanjing 210003 P.R.China College of Mathematics & Physics Nanjing University of Posts and Telecommunications Nanjing 210003 P.R.China
Recently, proxy ring signature schemes have been shown to be useful in various applications, such as electronic polling, electronic payment, etc. Although many proxy ring signature schemes have been pro-posed, there a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identity-based ring signature scheme based on quadratic residues
收藏 引用
High Technology Letters 2009年 第1期15卷 94-100页
作者: 熊虎 School of Computer Science and Engineering University of Electronic Science and Technology of China
Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are const... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A new improved ID-based proxy ring signature scheme from bilinear pairings
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2006年 第6期13卷 688-691页
作者: 郎为民 杨宗凯 程文青 谭运猛 PLA Institute of Communications Command Dept. of Electronic and Information Engineering Huazhong University of Science and Technology Wuhan 430074 China Dept. of Electronic and Information Engineering Huazhong University of Science and Technology
ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A ring signature SCHEME OVER BRAID GROUPS
收藏 引用
Journal of Electronics(China) 2010年 第4期27卷 522-527页
作者: Wei Yun Xiong Guohua Bao Wansu Zhang Xingkai Institute of Electronic Technology Information Engineering University Zhengzhou 450004 China Institute of Electronic Technology Beijing 100105 China Unit 96610 Beijing 102208 China
Quantum algorithms bring great challenges to classical public key cryptosystems, which makes cryptosystems based on non-commutative algebraic systems hop topic. The braid groups, which are non-commutative, have attrac... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Conditionally Anonymous Linkable ring signature for Blockchain Privacy Protection
收藏 引用
Computer Systems Science & Engineering 2023年 第12期47卷 2851-2867页
作者: Quan Zhou Yulong Zheng Minhui Chen Kaijun Wei School of Mathematics and Information Science Guangzhou UniversityGuangzhou510006China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China
In recent years,the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant *** ensure privacy protection for both sides of the transaction,many researchers are using ri... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论