Threshold Ring Signatures for Ad - hoc Groups
نویسندگان
چکیده
In this paper, we investigate the recent paradigm for group signatures proposed by Rivest et al. at Asiacrypt '01. We rst improve on their ring signature paradigm by showing that it holds under a strictly weaker assumption, namely the random oracle model rather than the ideal cipher. Then we provide extensions to make ring signatures suitable in practical situations, such as threshold schemes or ad-hoc groups. Finally we propose an eecient scheme for threshold scenarios based on a combinatorial method and provably secure in the random oracle model.
منابع مشابه
Threshold Ring Signatures and Applications to Ad-hoc Groups(Extended abstract)
In this paper, we investigate the recent paradigm for group signatures proposed by Rivest et al . at Asiacrypt ’01. We first improve on their ring signature paradigm by showing that it holds under a strictly weaker assumption, namely the random oracle model rather than the ideal cipher. Then we provide extensions to make ring signatures suitable in practical situations, such as threshold scheme...
متن کاملThreshold Ring Signatures and Applications to Ad-hoc Groups
In this paper, we investigate the recent paradigm for group signatures proposed by Rivest et al.. at Asiacrypt ’01. We first improve on their ring signature paradigm by showing that it holds under a strictly weaker assumption, namely the random oracle model rather than the ideal cipher. Then we provide extensions to make ring signatures suitable in practical situations, such as threshold scheme...
متن کاملThreshold Ring Signatures and Applications to Ad-hoc Groups(Full version)
In this paper, we investigate the recent paradigm for group signatures proposed by Rivest et al . at Asiacrypt ’01. We first improve on their ring signature paradigm by showing that it holds under a strictly weaker assumption, namely the random oracle model rather than the ideal cipher. Then we provide extensions to make ring signatures suitable in practical situations, such as threshold scheme...
متن کاملThreshold RSA for Dynamic and Ad-Hoc Groups
We consider the use of threshold signatures in adhoc and dynamic groups such as MANETs (“mobile ad-hoc networks”). We first show that known threshold RSA signatures (in particular the most efficient known scheme due to Shoup) are not practical enough for realistic use in these highly-constrained environments. Our contribution is in presenting variants of Shoup’s protocol that provide the effici...
متن کاملAnonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membership anonymously in such groups. Our schemes are based on the notion of accumulator with one-way domain, a natural extension of cryptographic accumulators we introduce in this work. We provide a formal model fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002