Skip to main content

and
  1. No Access

    Article

    An identity-based traceable ring signatures based on lattice

    While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable to malicious signers in certain scenarios, for example, in electronic voting, malicious users will vote multip...

    Junbin Liang, Qiong Huang, Jianye Huang in Peer-to-Peer Networking and Applications (2023)

  2. No Access

    Book and Conference Proceedings

    Green, Pervasive, and Cloud Computing

    12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings

    Man Ho Allen Au, Arcangelo Castiglione in Lecture Notes in Computer Science (2017)