Threshold ring signature for wireless sensor networks
Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the abstrusity of computational Diffie-Hellman problem...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | Jun-fang XIAO, Jian LIAO, Gui-hua ZENG |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2012-03-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)03-0075-07/ |
Similar Items
Threshold ring signature for wireless sensor networks
by: Jun-fang XIAO, et al.
Published: (2012-03-01)
by: Jun-fang XIAO, et al.
Published: (2012-03-01)
Privacy in wireless sensor networks using ring signature
by: Ashmita Debnath, et al.
Published: (2014-07-01)
by: Ashmita Debnath, et al.
Published: (2014-07-01)
Efficiency identity-based threshold group signature scheme
by: LIU Hong-wei 1, et al.
Published: (2009-01-01)
by: LIU Hong-wei 1, et al.
Published: (2009-01-01)
Efficiency identity-based threshold group signature scheme
by: LIU Hong-wei 1, et al.
Published: (2009-01-01)
by: LIU Hong-wei 1, et al.
Published: (2009-01-01)
Survey on ring signature
by: ZHANG Guo-yin, et al.
Published: (2007-01-01)
by: ZHANG Guo-yin, et al.
Published: (2007-01-01)
Survey on ring signature
by: ZHANG Guo-yin, et al.
Published: (2007-01-01)
by: ZHANG Guo-yin, et al.
Published: (2007-01-01)
Enhancing Copyright Protection Through Blockchain and Ring Signature Algorithm From Lattice
by: Jian Jiang, et al.
Published: (2024-01-01)
by: Jian Jiang, et al.
Published: (2024-01-01)
Research Progress and Prospect of Ring Signatures
by: XIE Jia, LIU Shizhao, WANG Lu, GAO Juntao, WANG Baocang
Published: (2023-05-01)
by: XIE Jia, LIU Shizhao, WANG Lu, GAO Juntao, WANG Baocang
Published: (2023-05-01)
Deletable blockchain based on threshold ring signature
by: Yanli REN, et al.
Published: (2019-04-01)
by: Yanli REN, et al.
Published: (2019-04-01)
Deletable blockchain based on threshold ring signature
by: Yanli REN, et al.
Published: (2019-04-01)
by: Yanli REN, et al.
Published: (2019-04-01)
ID-based on-line/off-line threshold signature scheme without bilinear pairing
by: Xiao-dong YANG, et al.
Published: (2013-08-01)
by: Xiao-dong YANG, et al.
Published: (2013-08-01)
ID-based on-line/off-line threshold signature scheme without bilinear pairing
by: Xiao-dong YANG, et al.
Published: (2013-08-01)
by: Xiao-dong YANG, et al.
Published: (2013-08-01)
On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures
by: Yan Ren, et al.
Published: (2020-01-01)
by: Yan Ren, et al.
Published: (2020-01-01)
Multi-threshold signature
by: Bartosz Nakielski, et al.
Published: (2023-06-01)
by: Bartosz Nakielski, et al.
Published: (2023-06-01)
Threshold ring signature: generic construction and logarithmic size instantiation
by: Huizhuo Wang, et al.
Published: (2024-07-01)
by: Huizhuo Wang, et al.
Published: (2024-07-01)
Universal composable threshold signature
by: HONG Xuan1, et al.
Published: (2009-01-01)
by: HONG Xuan1, et al.
Published: (2009-01-01)
Universal composable threshold signature
by: HONG Xuan1, et al.
Published: (2009-01-01)
by: HONG Xuan1, et al.
Published: (2009-01-01)
Certificateless Linkable Ring Signature Scheme
by: Lunzhi Deng, et al.
Published: (2020-01-01)
by: Lunzhi Deng, et al.
Published: (2020-01-01)
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature
by: Yang Zhang, et al.
Published: (2025-02-01)
by: Yang Zhang, et al.
Published: (2025-02-01)
Anti-Quantum Lattice-Based Ring Signature Scheme and Applications in VANETs
by: Chunhong Jiao, et al.
Published: (2021-10-01)
by: Chunhong Jiao, et al.
Published: (2021-10-01)
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
by: Anton Leevik, et al.
Published: (2023-07-01)
by: Anton Leevik, et al.
Published: (2023-07-01)
Security for wireless sensor networks using cryptography
by: P. Ramadevi, et al.
Published: (2023-10-01)
by: P. Ramadevi, et al.
Published: (2023-10-01)
A Threshold-Blind Signature Scheme and Its Application in Blockchain-Based Systems
by: Victor Reyes-Macedo, et al.
Published: (2024-01-01)
by: Victor Reyes-Macedo, et al.
Published: (2024-01-01)
A Lattice-Based Certificateless Traceable Ring Signature Scheme
by: Junbin Liang, et al.
Published: (2023-03-01)
by: Junbin Liang, et al.
Published: (2023-03-01)
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
by: mohammed abd, et al.
Published: (2023-03-01)
by: mohammed abd, et al.
Published: (2023-03-01)
Secure Ring Signature Scheme for Privacy-Preserving Blockchain
by: Lin Wang, et al.
Published: (2023-09-01)
by: Lin Wang, et al.
Published: (2023-09-01)
Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer
by: Mauro Tropea, et al.
Published: (2022-05-01)
by: Mauro Tropea, et al.
Published: (2022-05-01)
Analysis and construction for threshold signature scheme based on game theory
by: ANGJie W, et al.
Published: (2015-05-01)
by: ANGJie W, et al.
Published: (2015-05-01)
Analysis and construction for threshold signature scheme based on game theory
by: ANGJie W, et al.
Published: (2015-05-01)
by: ANGJie W, et al.
Published: (2015-05-01)
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
by: WANG Xiao-ming, et al.
Published: (2005-01-01)
Identity-based ring signature scheme under standard model
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)
Identity-based ring signature scheme under standard model
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)
Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT
by: Linlin He, et al.
Published: (2025-07-01)
by: Linlin He, et al.
Published: (2025-07-01)
Lattice based signatures with additional functionalities
by: Swati Rawal, et al.
Published: (2025-06-01)
by: Swati Rawal, et al.
Published: (2025-06-01)
Threshold Signature Schemes Application
by: Anastasiya Victorovna Beresneva, et al.
Published: (2015-10-01)
by: Anastasiya Victorovna Beresneva, et al.
Published: (2015-10-01)
ABE-IBS based signature-encryption method for WSN
by: QI Zheng-hua, et al.
Published: (2010-01-01)
by: QI Zheng-hua, et al.
Published: (2010-01-01)
ABE-IBS based signature-encryption method for WSN
by: QI Zheng-hua, et al.
Published: (2010-01-01)
by: QI Zheng-hua, et al.
Published: (2010-01-01)
Implementation of Boneh - Lynn - Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves
by: Nhu-Quynh Luc, et al.
Published: (2022-12-01)
by: Nhu-Quynh Luc, et al.
Published: (2022-12-01)
Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks
by: Chuanjun Yi, et al.
Published: (2018-11-01)
by: Chuanjun Yi, et al.
Published: (2018-11-01)
Similar Items
-
Threshold ring signature for wireless sensor networks
by: Jun-fang XIAO, et al.
Published: (2012-03-01) -
Privacy in wireless sensor networks using ring signature
by: Ashmita Debnath, et al.
Published: (2014-07-01) -
Efficiency identity-based threshold group signature scheme
by: LIU Hong-wei 1, et al.
Published: (2009-01-01) -
Efficiency identity-based threshold group signature scheme
by: LIU Hong-wei 1, et al.
Published: (2009-01-01) -
Survey on ring signature
by: ZHANG Guo-yin, et al.
Published: (2007-01-01)
