Author:
Hwang Jung Yeon,Chang Ku-Young,Cho Hyun Sook,Song Boyeon,Susilo Willy
Publisher
Springer Science and Business Media LLC
Reference35 articles.
1. Bender A, Katz J, Morselli R. Ring signatures: stronger definitions, and constructions without random oracles. J Crypt, 2009, 22: 114–138
2. Rivest R, Shamir A, Tauman Y. How to leak a secret. Lect Notes Comput Sci, 2001, 2248: 552–565
3. Lv J, Wang X. Verifiable ring signature. In: Proceedings of CANS’03, Miami, 2003. 663–665
4. Lee K C, Wen H-A, Hwang T. Convertible ring signature. IEE Proc Commun, 2005, 152: 411–414
5. Rivest R, Shamir A, Tauman Y. How to leak a secret: theory and applications of ring signatures. Lect Notes Comput Sci, 2010, 3895: 552–565