2012
DOI: 10.1007/978-3-642-25206-8_17
|View full text |Cite
|
Sign up to set email alerts
|

Threshold Discernible Ring Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…We base our system on threshold discernible ring signatures (TDS), which were introduced by Kumar et al [12]. In a t-threshold discernible ring signature, a user in the system can generate a signature using his/her own private key and the public keys of the other n ring members (with n > t).…”
Section: Appendix a Basics Of Game Theorymentioning
confidence: 99%
See 1 more Smart Citation
“…We base our system on threshold discernible ring signatures (TDS), which were introduced by Kumar et al [12]. In a t-threshold discernible ring signature, a user in the system can generate a signature using his/her own private key and the public keys of the other n ring members (with n > t).…”
Section: Appendix a Basics Of Game Theorymentioning
confidence: 99%
“…This t is set to 60% of n. (5) The public keys and the parameters of the ring signature (of each group member) and the public key of the EMS are publicly available. (6) The threshold discernible ring signatures (TDS) [12] provides unforgeability and signer anonymity (details of TDS can be found in Appendix B). (7) The system proposes to leverage GPS and signal triangulation technologies to automatically sense device location.…”
Section: B Design Assumptionsmentioning
confidence: 99%