Schemes for Encryption with Anonymity and Ring Signature

  • Authors:
  • Ryotaro Hayashi;Keisuke Tanaka

  • Affiliations:
  • The authors are with the Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo, 152-8552 Japan. E-mail: hayashi9@is.titech.ac.jp, E-mail: keisuke@is.titech.ac.jp;The authors are with the Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo, 152-8552 Japan. E-mail: hayashi9@is.titech.ac.jp, E-mail: keisuke@is.titech.ac.jp

  • Venue:
  • IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present previously unproposed schemes for encryption with anonymity and ring signature by applying two techniques. That is, we construct a key-privacy encryption scheme by using N-ary representation, and a ring signature scheme by using the repetition of evaluation of functions. We analyze precisely the properties of these schemes and show their advantage and disadvantage.