메뉴 건너뛰기




Volumn 26, Issue 1, 2014, Pages 157-165

Linkable ring signature with unconditional anonymity

Author keywords

anonymity; linkable; Ring signature

Indexed keywords

ANONYMITY; LINKABLE; LINKABLE RING SIGNATURES; RANDOM ORACLE MODEL; RING SIGNATURES;

EID: 84890338882     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2013.17     Document Type: Article
Times cited : (83)

References (39)
  • 2
    • 0028446824 scopus 로고
    • A new dynamic voting algorithm for distributed database systems
    • June
    • N.R. Adam, "A New Dynamic Voting Algorithm for Distributed Database Systems, " IEEE Trans. Knowledge and Data Eng., vol. 6, no. 3, pp. 470-478, June 1994.
    • (1994) IEEE Trans. Knowledge and Data Eng , vol.6 , Issue.3 , pp. 470-478
    • Adam, N.R.1
  • 8
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Advances in Cryptology - CRYPTO '97
    • J. Camenisch and M. Stadler, "Efficient Group Signature Schemes for Large Groups (Extended Abstract), " Proc. 17th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '97), pp. 410-424, 1997. (Pubitemid 127112569)
    • (1997) Lecture notes in computer science , Issue.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 11
    • 0041848378 scopus 로고    scopus 로고
    • Stability analysis of regional and national voting schemes by a continuous model
    • July-Aug
    • L. Chen and N. Tokuda, "Stability Analysis of Regional and National Voting Schemes by a Continuous Model, " IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 1037-1042, July-Aug. 2003.
    • (2003) IEEE Trans. Knowledge and Data Eng , vol.15 , Issue.4 , pp. 1037-1042
    • Chen, L.1    Tokuda, N.2
  • 14
    • 26444540788 scopus 로고    scopus 로고
    • Efficient identity based ring signature
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • S.S.M. Chow, S.-M. Yiu, and L.C.K. Hui, "Efficient Identity Based Ring Signature, " Proc. Third Int'l Conf. Applied Cryptography and Network Security (ACNS '05), pp. 499-512, 2005. (Pubitemid 41422135)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 499-512
    • Chow, S.S.M.1    Yiu, S.-M.2    Hui, L.C.K.3
  • 16
    • 78149266057 scopus 로고    scopus 로고
    • Voting systems with trust mechanisms in cyberspace: Vulnerabilities and defenses
    • Dec
    • Q. Feng, Y.L. Sun, L. Liu, Y. Yang, and Y. Dai, "Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses, " IEEE Trans. Knowledge and Data Eng., vol. 22, no. 12, pp. 1766-1780, Dec. 2010.
    • (2010) IEEE Trans. Knowledge and Data Eng , vol.22 , Issue.12 , pp. 1766-1780
    • Feng, Q.1    Sun, Y.L.2    Liu, L.3    Yang, Y.4    Dai, Y.5
  • 19
    • 46649118688 scopus 로고    scopus 로고
    • Ring signature with weak linkability and its applications
    • Aug
    • I.R. Jeong, J.O. Kwon, and D.H. Lee, "Ring signature with Weak Linkability and Its Applications, " IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1145-1148, Aug. 2008.
    • (2008) IEEE Trans. Knowledge and Data Eng , vol.20 , Issue.8 , pp. 1145-1148
    • Jeong, I.R.1    Kwon, J.O.2    Lee, D.H.3
  • 23
    • 24944589673 scopus 로고    scopus 로고
    • Linkable ring signatures: Security models and new schemes
    • Computational Science and Its Applications - ICCSA 2005: International Conference, Proceedings
    • J.K. Liu and D.S. Wong, "Linkable Ring Signatures: Security Models and New Schemes, " Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '05), pp. 614-623, 2005. (Pubitemid 41313741)
    • (2005) Lecture Notes in Computer Science , vol.3481 , Issue.II , pp. 614-623
    • Liu, J.K.1    Wong, D.S.2
  • 25
    • 79960911439 scopus 로고    scopus 로고
    • State monitoring in cloud datacenters
    • Set
    • S. Meng, L. Liu, and T. Wang, "State Monitoring in Cloud Datacenters, " IEEE Trans. Knowledge and Data Eng., vol. 23, no. 9, pp. 1328-1344, Sept. 2011.
    • (2011) IEEE Trans. Knowledge and Data Eng , vol.23 , Issue.9 , pp. 1328-1344
    • Meng, S.1    Liu, L.2    Wang, T.3
  • 26
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • D. Pointcheval and J. Stern, "Security Proofs for Signature Schemes, " Proc. 15th Ann. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '96), pp. 387-398, 1996. (Pubitemid 126071081)
    • (1996) Lecture notes in computer science , Issue.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 27
    • 84946833891 scopus 로고    scopus 로고
    • How to Leak a Secret
    • Advances in Cryptology - ASIACRYPT 2001
    • R.L. Rivest, A. Shamir, and Y. Tauman, "How to Leak a Secret, " Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '01), pp. 552-565, 2001. (Pubitemid 33371206)
    • (2002) Lecture notes in computer science , Issue.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 30
    • 24644461219 scopus 로고    scopus 로고
    • Short linkable ring signatures for E-voting, E-cash and attestation
    • Information Security Practice and Experience - First International Conference, ISPEC 2005, Proceedings
    • P.P. Tsang and V.K. Wei, "Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation, " Proc. First Int'l Conf. Information Security Practice and Experience (ISPEC '05), pp. 48- 60, 2005. (Pubitemid 41273777)
    • (2005) Lecture Notes in Computer Science , vol.3439 , pp. 48-60
    • Tsang, P.P.1    Wei, V.K.2
  • 32
    • 77954843911 scopus 로고    scopus 로고
    • Toward publicly auditable secure cloud data storage services
    • July/Aug
    • C. Wang, K. Ren, W. Lou, and J. Li, "Toward Publicly Auditable Secure Cloud Data Storage Services, " IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 33
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • B. Waters, "Efficient Identity-Based Encryption Without Random Oracles, " Proc. 24th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '05), pp. 114-127, 2005. (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1
  • 36
    • 84875690586 scopus 로고    scopus 로고
    • Efficient linkable and/or threshold ring signature without random oracles
    • T.H. Yuen, J.K. Liu, M.H. Au, W. Susilo, and J. Zhou, "Efficient Linkable and/or Threshold Ring Signature Without Random Oracles, " Computer J., vol. 56, no. 4, pp. 407-421, 2013.
    • (2013) Computer J , vol.56 , Issue.4 , pp. 407-421
    • Yuen, T.H.1    Liu, J.K.2    Au, M.H.3    Susilo, W.4    Zhou, J.5
  • 39
    • 80053516153 scopus 로고    scopus 로고
    • Enforcing role- based access control for secure data storage in the cloud
    • L. Zhou, V. Varadharajan, and M. Hitchens, "Enforcing Role- Based Access Control for Secure Data Storage in the Cloud, " Comput. J., vol. 54, no. 10, pp. 1675-1687, 2011.
    • (2011) Comput. J , vol.54 , Issue.10 , pp. 1675-1687
    • Zhou, L.1    Varadharajan, V.2    Hitchens, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.