2013
DOI: 10.4103/0377-2063.118032
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy of ring signature schemes: Theory and applications

Abstract: Ring signature is a primitive that allows an entity to sign a message on behalf of a group of potential signers (called a ring) while preserving unconditional anonymity in the ring. Ring signature has found many applications in fair exchange, electronic transaction protocols, and ad hoc networks. In this paper, a survey of ring signature from a number of perspectives is presented to provide researchers with a better understanding of this primitive. We survey the state-of-the-art of ring signature schemes along… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 81 publications
0
2
0
Order By: Relevance
“…Schemes introduced prior to the publication of the security definitions from Bender et al [15] lack the appropriate proofs [1], require unusual primitives that are difficult to use in practice [18,41,102], or reduce to a generic form of our approach [2]. Schemes published after the definitions from Bender et al [15] either focus on adding new features, or offering strong standard model security proofs (at the expense of practicality) [98]. Additionally, "efficient" ring signature schemes typically focus on scalability with respect to ring size [41].…”
Section: Efficient Ring Signatures In the Rommentioning
confidence: 99%
“…Schemes introduced prior to the publication of the security definitions from Bender et al [15] lack the appropriate proofs [1], require unusual primitives that are difficult to use in practice [18,41,102], or reduce to a generic form of our approach [2]. Schemes published after the definitions from Bender et al [15] either focus on adding new features, or offering strong standard model security proofs (at the expense of practicality) [98]. Additionally, "efficient" ring signature schemes typically focus on scalability with respect to ring size [41].…”
Section: Efficient Ring Signatures In the Rommentioning
confidence: 99%
“…Subsequently, various extensions such as an identity-based RS [18][19][20][21][22], a threshold RS [23,24], a linkable RS [8,19], an accountable RS [25], and a traceable RS [26] have been proposed [27]. We refer to [5,28,29] for a survey of ring signatures. A notion of a convertible RS scheme was first introduced in [2,3].…”
Section: Introductionmentioning
confidence: 99%