CONTROL-CURRENT ACCURATE AND SECRET TRUTHS ALLOCATION WITH ADVANCING SAFETY
Abstract
Keywords
References
S. S. M. Chow, V.K.-W. Wei, J. K. Liu, and T. H. Yuen, “Ring signatures without random oracles,” in Proc. ACM Symp. Inform., Comput., Commun. Security, 2006, pp. 297–302.
S. S. M. Chow, S.-M. Yiu, and L. C. K. Hui, “Efficient identity based ring signature,” in Proc. 3rd Int. Conf. Appl. Cryptography Netw. Security, 2005, vol. 3531, pp. 499–512.
R. Cramer, I. Damga rd, and B. Schoenmakers, “Proofs of partial knowledge and simplified design of witness hiding protocols,” in Proc. 14th Annu. Int. Cryptol. Conf. Adv. Cryptol., 1994, vol. 839, pp. 174–187.
J. K. Liu and D. S. Wong, “Solutions to key exposure problem in ring signature,” I. J. Netw. Secur., vol. 6, no. 2, pp. 170–180, 2008.
J. K. Liu, T. H. Yuen, and J. Zhou, “Forward secure ring signature without random oracles,” in Proc. 13th Int. Conf. Inform. Commun. Security, 2011, vol. 7043, pp. 1–14.
X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure multi-owner data sharing for dynamic groups in the cloud,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1182–1191, Jun. 2013.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.