2005
DOI: 10.1049/ip-com:20045283
|View full text |Cite
|
Sign up to set email alerts
|

Convertible ring signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(21 citation statements)
references
References 1 publication
0
19
0
Order By: Relevance
“…Compared with the schemes proposed in Refs. [8,18,32], DRS also solved the problem in which the signer can shift the blame to entities. Later, Wang and Liu [44] introduced a signer-admission ring signature scheme (WL06), which combines the idea of the designated confirmer signatures (DCS) and the designated verifier proofs.…”
Section: Verifiable Ring Signaturementioning
confidence: 92%
See 2 more Smart Citations
“…Compared with the schemes proposed in Refs. [8,18,32], DRS also solved the problem in which the signer can shift the blame to entities. Later, Wang and Liu [44] introduced a signer-admission ring signature scheme (WL06), which combines the idea of the designated confirmer signatures (DCS) and the designated verifier proofs.…”
Section: Verifiable Ring Signaturementioning
confidence: 92%
“…Gan and Chen [18] proposed an efficient method to transform Rivest's scheme into a verifiable ring signature scheme, in which the actual signer can embed identification information into a socalled subliminal channel. In 2005, Lee et al [32] proposed an efficient convertible ring signature scheme, which not only keeps all properties of a ring signature, but also enables the real signer to turn his ring signature into an ordinary signature by releasing some information.…”
Section: Verifiable Ring Signaturementioning
confidence: 99%
See 1 more Smart Citation
“…The convertible ring signature scheme proposed in [4] is the extension of a ring signature scheme proposed in [2]. It deals with only the convertibility of the ring signature scheme.…”
Section: A Related Workmentioning
confidence: 99%
“…It enables any individual to spontaneously conscript arbitrarily n − 1 entities and generate a publicly verifiable 1-out-of-n signature on behalf of the whole group (called a ring), yet the actual signer remains anonymous. Many extensions of a standard ring signature, such as linkable ring signature [3], convertible ring signature [4], separable ring signature [5], [6], threshold ring signature [7], ID-based ring signature [8], proxy ring signature [9], ring authenticated encryption [10], conditionally anonymous ringsignature [11] have been proposed in the literature. Ring signature and its variants have been used in many applications such as leaking secrets [2], designated verifier signature [2], anonymous identification/authentication for ad hoc groups [7], e-voting [3], e-cash, attestation in [12], bidderanonymous english auction [13] and so on.…”
Section: Introductionmentioning
confidence: 99%