Web
Education
Viewing 1-2 of 2 total results
ID-based Ring Signature and Proxy Ring Signature Schemes ...
ID-based ring signature scheme and a proxy ring signa-ture scheme. Both the schemes are more efficient than existing one. These schemes also take care of the incon-sistencies in above two schemes. Keywords: Bilinear pairings, cryptography, digital signa-ture, ID-based, ring signature 1 Introduction The concept of ring signature was introduced ......
ID-based Ring Signature and Proxy Ring Signature Schemes ...
In 1984, Shamir [14] introduced ID-based encryption and signature schemes to simplify key management procedures in certi cate-based public key setting. Re-cently, many bilinear pairings based ID-based signature schemes were developed. [1{7,16,17] In this paper we propose a new ID-based ring signature scheme and also an ID-...
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.