A provably secure ID-based ring signature scheme
نویسندگان
چکیده
Identity-based (ID) cryptosystems avoid the necessity of cer-tiicates to authenticate public keys in a digital communications system. This is desirable, specially for these applications which involve a large number of public keys in each execution. For example, any computation and veriication of a ring signature, where a user anonymously signs a message on behalf of a set of users including himself, requires to authenticate the public keys of all the members of the set. We use bilinear pairings to design a new ID-based ring signature scheme. We extend to the ID-based scenario some known results about the security of generic ring signature schemes. This allows us to formally prove the security of our scheme, under the assumption that the Computational Diie-Hellman problem is hard to solve.
منابع مشابه
Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constructing an identitybased (ID-based) ring signature scheme with constant-size signatures and its interactive counterpart, and providing membership revocation to group signature, traceable signature and identity escrow sc...
متن کاملA Provably Secure Ring Signature Scheme in Certificateless Cryptography
Ring signature is a kind of group-oriented signature. It allows amember of a group to sign messages on behalf of the group withoutrevealing his/her identity. Certificateless public key cryptography wasfirst introduced by Al-Riyami and Paterson in Asiacrypt 2003. Incertificateless cryptography, it does not require the use of certificatesto guarantee the authenticity of users’...
متن کاملIdentity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n − t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we present an identity based (ID-based) threshol...
متن کاملConstant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature
In this paper, we propose a new notion called Revocable-iffLinked Ring Signature (R-iff-L Ring Signature). In R-iff-L ring signatures, a signer can sign on behalf of the whole group, just like ordinary ring signatures. However, if he signs twice or more, he can be linked and his identity can be revoked by everyone. We formally define a new security model for the new notion in identity-based (ID...
متن کاملIdentity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an ID-based threshold signature scheme based on Paterson and Schuldt’s signature scheme is presented. The proposed construction is proved secure in the standard model and its security rests on the hardness of the computa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2003 شماره
صفحات -
تاریخ انتشار 2003