Table of Contents Author Guidelines Submit a Manuscript

An erratum for this article has been published. To view the erratum, please click here.

Security and Communication Networks
Volume 2017, Article ID 1915239, 7 pages
Research Article

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

1Department of Computer and Information Technology, Zhejiang Police College, Hangzhou, Zhejiang Province, China
2Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China
3Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA
4College of Information Engineering, China University of Geosciences, Wuhan, China
5Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249, USA

Correspondence should be addressed to Xiaohui Yuan; ude.tnu@nauy.iuhoaix

Received 23 March 2017; Accepted 2 July 2017; Published 1 August 2017

Academic Editor: Mamoun Alazab

Copyright © 2017 Guomin Zhou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

How to Cite this Article

Guomin Zhou, Peng Zeng, Xiaohui Yuan, Siyuan Chen, and Kim-Kwang Raymond Choo, “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model,” Security and Communication Networks, vol. 2017, Article ID 1915239, 7 pages, 2017.