A multivariate based threshold ring signature scheme
نویسندگان
چکیده
منابع مشابه
A New Multivariate-based Ring Signature Scheme
Most of the existing ring signature schemes are based on traditional cryptography, such as RSA and discrete logarithm. Unfortunately these schemes would be broken if quantum computers emerge. The MQ-problem based PublicKey Cryptosystem (MPKC) is an important alternative to traditional PKCs for its potential to resist future attacks of quantum computers. In this paper, we proposed a new ring sig...
متن کاملA Lattice-Based Threshold Ring Signature Scheme
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar’s code-based solution to use the short integer solution (SIS) problem as security assumption, instead of the syndrome decoding (SD) problem. By applying the CLRS identification scheme, we are also able to have a performance gain as result of the reduction in the soundness error to 1/2 per round. S...
متن کاملImproved Lattice-Based Threshold Ring Signature Scheme
We present in this paper an improvement of the lattice-based threshold ring signature proposed by Cayrel, Lindner, Rückert and Silva (CLRS) [LATINCRYPT ’10]. We generalize the same identification scheme CLRS to obtain a more efficient threshold ring signature. The security of our scheme relies on standard lattice problems. The improvement is a significant reduction of the size of the signature....
متن کاملIdentity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n − t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we present an identity based (ID-based) threshol...
متن کاملA Threshold Ring Signature Scheme with a Variety of Keys
In this paper we present a (t, n)-ring signature scheme in which each ring member can use a different underlying signature scheme. The scheme is existentially secure in the random oracle model against adaptive chosenmessage attacks in which an adversary may corrupt up to t−1 ring members, under the security assumptions of the underlying signature schemes for each ring member. The threshold sign...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applicable Algebra in Engineering, Communication and Computing
سال: 2013
ISSN: 0938-1279,1432-0622
DOI: 10.1007/s00200-013-0190-3