2020
DOI: 10.3934/amc.2020016
|View full text |Cite
|
Sign up to set email alerts
|

Efficient traceable ring signature scheme without pairings

Abstract: Although currently several traceable (or linkable) ring signature schemes have been proposed, most of them are constructed on pairings. In this paper, we present an efficient traceable ring signature (TRS) scheme without pairings, which is based on the modified EDL signature (first proposed by D.Chaum et al. in Crypto 92). Compared with other ring signature schemes, the proposed scheme does not employ pairing computation and has some computational advantages, whose security can be reduced to the computational … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
19
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 52 publications
0
19
0
Order By: Relevance
“…With the development of communication technology and the coming of information age, people are more and more aware of the important role of information security [71][72][73][74][75][76], and the research of various security protection has become the current research hotspot [77][78][79][80][81][82]. As an important part of information security transmission, random number generator (RNG) has been paid more and more attention.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of communication technology and the coming of information age, people are more and more aware of the important role of information security [71][72][73][74][75][76], and the research of various security protection has become the current research hotspot [77][78][79][80][81][82]. As an important part of information security transmission, random number generator (RNG) has been paid more and more attention.…”
Section: Introductionmentioning
confidence: 99%
“…With the application of network information technology, people attach great importance to the security and confidentiality of information [54][55][56][57][58][59][60][61][62][63][64][65][66]. Researchers are constantly looking for new methods of confidentiality [54][55][56][57][58][59][60][61][62][63][64][65][66]. Secure communication and chaotic encryption based on chaotic synchronization have become one of the research hotspots in the field of information security in recent years.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of computer technology, the accompanying information security issues have attracted more and more attention and become a hot issue [32][33][34][35][36][37][38][39][40][41][42]. Chaos is widely used in cryptosystems, random numbers, and secure communications [43][44][45][46][47][48][49], and it has become a hot topic in nonlinear circuits and systems.…”
Section: Introductionmentioning
confidence: 99%