Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Ring signatures without random oracles
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Group signature where group manager, members and open authority are identity-based
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Short linkable ring signatures revisited
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Identity-based strong multi-designated verifiers signatures
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Accumulators from bilinear pairings and applications
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Identity based ring signature: why, how and what next
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Short linkable ring signatures for e-voting, e-cash and attestation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Tracing-by-linking group signatures
ISC'05 Proceedings of the 8th international conference on Information Security
Separable linkable threshold ring signatures
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Identity based threshold ring signature
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Generic construction of (identity-based) perfect concurrent signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
How to leak a secret: theory and applications of ring signatures
Theoretical Computer Science
Ring signatures: stronger definitions, and constructions without random oracles
TCC'06 Proceedings of the Third conference on Theory of Cryptography
An efficient static blind ring signature scheme
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Blind signature and ring signature schemes: Rehabilitation and attack
Computer Standards & Interfaces
Subliminal channels in the identity-based threshold ring signature
International Journal of Computer Mathematics
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
ProvSec'10 Proceedings of the 4th international conference on Provable security
Sub-linear size traceable ring signatures without random oracles
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Anonymous identification and designated-verifiers signatures from insecure batch verification
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
Hi-index | 0.00 |
Ring signatures allow a user to sign anonymously on behalf of a group of spontaneously conscripted members. Two ring signatures are linked if they are issued by the same signer. We introduce the notion of Escrowed Linkability of ring signatures, such that only a Linking Authority can link two ring signatures; otherwise two ring signatures remain unlinkable to anyone. We give an efficient instantiation, and discuss the applications of escrowed linkability, like spontaneous traceable signature and anonymous verifiably encrypted signature. Moreover, we propose the first short identity-based linkable ring signatures from bilinear pairings. All proposals are provably secure under the random oracle model.