ID-Based Ring Signature against Continual Side Channel Attack

The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility and complete anonymity. It can be used in some systems such as anonymous au...

Full description

Bibliographic Details
Main Authors: Qihong Yu, Jiguo Li, Jian Shen
Format: Article
Language:English
Published: MDPI AG 2023-01-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/15/1/179