Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
In this work, we initially study the necessary properties and security requirements of Ring
Confidential Transaction (RingCT) protocol deployed in the popular anonymous …
Confidential Transaction (RingCT) protocol deployed in the popular anonymous …
Platform-independent secure blockchain-based voting system
Cryptographic techniques are employed to ensure the security of voting systems in order to
increase its wide adoption. However, in such electronic voting systems, the public bulletin …
increase its wide adoption. However, in such electronic voting systems, the public bulletin …
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringCT v1. 0)
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS)
scheme, which enables the public to verify if two or more signatures were generated by …
scheme, which enables the public to verify if two or more signatures were generated by …
Raptor: a practical lattice-based (linkable) ring signature
We present Raptor, the first practical lattice-based (linkable) ring signature scheme with
implementation. Raptor is as fast as classical solutions; while the size of the signature is …
implementation. Raptor is as fast as classical solutions; while the size of the signature is …
Two-factor data security protection mechanism for cloud storage system
In this paper, we propose a two-factor data security protection mechanism with factor
revocability for cloud storage system. Our system allows a sender to send an encrypted …
revocability for cloud storage system. Our system allows a sender to send an encrypted …
Efficient linkable and/or threshold ring signature without random oracles
Linkable ring signatures have found many attractive applications. One of the recent
important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately …
important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately …
Certificate-based signature schemes without pairings or random oracles
In this paper, we propose two new certificate-based signature (CBS) schemes with new
features and advantages. The first one is very efficient as it does not require any pairing …
features and advantages. The first one is very efficient as it does not require any pairing …
[PDF][PDF] Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
For most elections, receipt-freeness is important–voters are unable to prove to others on
how they voted, in order to prevent vote-buying. Many existing receipt-free electronic voting …
how they voted, in order to prevent vote-buying. Many existing receipt-free electronic voting …
An efficient short certificate-based signature scheme
J Li, X Huang, Y Zhang, L Xu - Journal of Systems and Software, 2012 - Elsevier
Certificate-based cryptography combines the merits of traditional public key infrastructure
(PKI) and identity-based cryptography. It does not have the key escrow problem in identity …
(PKI) and identity-based cryptography. It does not have the key escrow problem in identity …
Provably secure certificate-based signature scheme without pairings
J Li, Z Wang, Y Zhang - Information Sciences, 2013 - Elsevier
In order to simplify certificate management in traditional public key cryptography and solve
the key escrow problem in identity-based cryptography, the notion of certificate-based …
the key escrow problem in identity-based cryptography, the notion of certificate-based …