2017
DOI: 10.1155/2017/1915239
|View full text |Cite|
|
Sign up to set email alerts
|

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

Abstract: Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring). While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Any conspiracy of less than t corrupted members cannot produce a valid signature. Several threshold ring signature schemes ( [4][5][6][7][8][9][10][11][12]24,25]) were put forward. The application of threshold technology is widely in many subject areas, including in the cutting-edge direction such as big data ( [27], [28]).…”
Section: Introductionmentioning
confidence: 99%
“…Any conspiracy of less than t corrupted members cannot produce a valid signature. Several threshold ring signature schemes ( [4][5][6][7][8][9][10][11][12]24,25]) were put forward. The application of threshold technology is widely in many subject areas, including in the cutting-edge direction such as big data ( [27], [28]).…”
Section: Introductionmentioning
confidence: 99%