In this paper, we present previously unproposed schemes for encryption with anonymity and ring signature by applying two techniques. That is, we construct a key-privacy encryption scheme by using N-ary representation, and a ring signature scheme by using the repetition of evaluation of functions. We analyze precisely the properties of these schemes and show their advantage and disadvantage.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Ryotaro HAYASHI, Keisuke TANAKA, "Schemes for Encryption with Anonymity and Ring Signature" in IEICE TRANSACTIONS on Fundamentals,
vol. E89-A, no. 1, pp. 66-73, January 2006, doi: 10.1093/ietfec/e89-a.1.66.
Abstract: In this paper, we present previously unproposed schemes for encryption with anonymity and ring signature by applying two techniques. That is, we construct a key-privacy encryption scheme by using N-ary representation, and a ring signature scheme by using the repetition of evaluation of functions. We analyze precisely the properties of these schemes and show their advantage and disadvantage.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e89-a.1.66/_p
Copy
@ARTICLE{e89-a_1_66,
author={Ryotaro HAYASHI, Keisuke TANAKA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Schemes for Encryption with Anonymity and Ring Signature},
year={2006},
volume={E89-A},
number={1},
pages={66-73},
abstract={In this paper, we present previously unproposed schemes for encryption with anonymity and ring signature by applying two techniques. That is, we construct a key-privacy encryption scheme by using N-ary representation, and a ring signature scheme by using the repetition of evaluation of functions. We analyze precisely the properties of these schemes and show their advantage and disadvantage.},
keywords={},
doi={10.1093/ietfec/e89-a.1.66},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Schemes for Encryption with Anonymity and Ring Signature
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 66
EP - 73
AU - Ryotaro HAYASHI
AU - Keisuke TANAKA
PY - 2006
DO - 10.1093/ietfec/e89-a.1.66
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E89-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2006
AB - In this paper, we present previously unproposed schemes for encryption with anonymity and ring signature by applying two techniques. That is, we construct a key-privacy encryption scheme by using N-ary representation, and a ring signature scheme by using the repetition of evaluation of functions. We analyze precisely the properties of these schemes and show their advantage and disadvantage.
ER -