期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
1
作者 Yongxin ZHANG Hong LEI +5 位作者 Bin WANG Qinghao WANG Ning LU Wenbo SHI bangdao chen Qiuling YUE 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第2期251-253,共3页
1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their d... 1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their data[1,2].The traceable ring signatures(TRSs)addresses the contradiction between identity privacy and regulation[3],no scheme has been developed thus far that is based on SM2,the Chinese cryptographic public key algorithm standard,without relying on centralized trust. 展开更多
关键词 SM2 SIGNATURE SCHEME
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部