Identity-based ring signature scheme based on quadratic residues

被引:0
作者
Xiong, Hu [1 ]
Qin, Zhiguang [1 ]
Li, Fagen [1 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China
关键词
Identity-based signature; Provable security; Quadratic residue; Random oracle; Ring signature;
D O I
10.3772/j.issn.1006-6748.2009.01.017
中图分类号
学科分类号
摘要
Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are constructed from bilinear pairings, a powerful but computationally expensive primitive. Hence, ID-based ring signature without pairing is of great interest in the field of cryptography. In this paper, the authors firstly propose an ID-based ring signature scheme based on quadratic residues. The proposed scheme is proved to be existentially unforgeable against adaptive chosen message-and-identity attack under the random oracle model, assuming the hardness of factoring. The proposed scheme is more efficient than those which are constructed from bilinear pairings. Copyright © by High Technology Letters Press.
引用
收藏
页码:94 / 100
页数:6
相关论文
共 18 条
[1]  
Rivest R.L., Shamir A., Tauman Y., How to leak a secret, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advance in Cryptology, pp. 552-565, (2001)
[2]  
Chaum D., van Hevst E., Group signature, Proceedings of EUROCRYPT 1991, LNCS547, pp. 257-265, (1991)
[3]  
Chen L., Kudla C., Paterson K., Concurrent signatures, Proceedings of EUROCRYPT 2004, pp. 287-305, (2004)
[4]  
Rivest R., Shamir A., Tauman Y., How to leak a secret: Theory and applications of ring signatures, Theoretical Computer Science, Essays in Memory of Shimon Even, (2006)
[5]  
Chow S., Lui R., Hui L., Et al., Identity based ring signature: Why, how and what next, Proceedings of the 2nd European Public Key Infrastructure Workshop: Research and Application, EuroPKI 2005, pp. 144-161, (2005)
[6]  
Adi S., Identity-based cryptosystems and signature schemes, Proceedings of CRYPTO 84 on Advances in Cryptology, pp. 47-53, (1984)
[7]  
Zhang F., Kim K., ID-based blind signature and ring signature from pairings, Proceedings of ASIACRYPT 2002, pp. 533-547, (2002)
[8]  
Lin C., Wu T., An identity-based ring signature scheme from bilinear pairings, (2003)
[9]  
Awasthi A., Lal S., ID-based ring signature and proxy ring signature schemes from bilinear pairings, (2004)
[10]  
Javier H., Saez G., New identity-based ring signature schemes, Proceedings of the 6th International Conference on Information and Communications Security (ICICS 2004), LNCS3269, pp. 27-39, (2004)