Traceable Identity-Based Ring Signature for Protecting Mobile IoT Devices.
Xin PengKe GuZhenlin LiuWenbin ZhangPublished in: DMBD (2) (2021)
Keyphrases
- ring signature
- signature scheme
- mobile devices
- mobile applications
- mobile computing
- smart objects
- electronic voting
- ring signature scheme
- key management
- standard model
- public key
- digital signature
- access control
- secret key
- designated verifier
- cloud computing
- key distribution
- private key
- blind signature
- ad hoc networks
- lightweight