Abstract | ||
---|---|---|
Ring signatures can achieve the anonymity of the users who want to sign documents not only in the authenticated way but also in the confidential way. Based on the k-CAA2 assumption, a security designated verifier ring signature scheme is proposed from bilinear pairing. Furthermore, a designated verifier ring signcryption scheme is also proposed from the new designated verifier ring signature scheme. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1504/IJIIDS.2013.056387 | IJIIDS |
Keywords | Field | DocType |
ring signature,bilinear pairing,k-caa2 assumption,verifier ring signature scheme,verifier ring signcryption scheme | Data mining,Authentication,Computer science,Ring signature,Theoretical computer science,Signcryption,Bilinear pairing,Anonymity | Journal |
Volume | Issue | Citations |
7 | 5 | 0 |
PageRank | References | Authors |
0.34 | 6 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiao-Tong Fu | 1 | 10 | 3.46 |
Wen Liu | 2 | 0 | 0.34 |
Ruijun Shi | 3 | 0 | 1.01 |