Identity-based ring signature scheme based on quadratic residues

被引:0
作者
Xiong, Hu [1 ]
Qin, Zhiguang [1 ]
Li, Fagen [1 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China
关键词
Identity-based signature; Provable security; Quadratic residue; Random oracle; Ring signature;
D O I
10.3772/j.issn.1006-6748.2009.01.017
中图分类号
学科分类号
摘要
Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are constructed from bilinear pairings, a powerful but computationally expensive primitive. Hence, ID-based ring signature without pairing is of great interest in the field of cryptography. In this paper, the authors firstly propose an ID-based ring signature scheme based on quadratic residues. The proposed scheme is proved to be existentially unforgeable against adaptive chosen message-and-identity attack under the random oracle model, assuming the hardness of factoring. The proposed scheme is more efficient than those which are constructed from bilinear pairings. Copyright © by High Technology Letters Press.
引用
收藏
页码:94 / 100
页数:6
相关论文
共 50 条
  • [2] Identity-based signature scheme based on quadratic residues
    Chai ZhenChuan
    Cao ZhenFu
    Dong XiaoLei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 373 - 380
  • [3] Identity-based signature scheme based on quadratic residues
    ZhenChuan Chai
    ZhenFu Cao
    XiaoLei Dong
    Science in China Series F: Information Sciences, 2007, 50 : 373 - 380
  • [4] Identity-based signature scheme based on quadratic residues
    CHAI ZhenChuan
    Science in China(Series F:Information Sciences), 2007, (03) : 373 - 380
  • [5] Identity-based Ring Signature Scheme Based on Cubic Residues
    Dong, Xuedong
    Liu, Xinxin
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 897 - 900
  • [6] Identity-based signature scheme based on quintic residues
    Dong, Xue-Dong
    Gao, Yuan
    PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016), 2016, 117 : 836 - 841
  • [7] Identity oriented signature scheme based on quadratic residues
    Qiu, WD
    Chen, KF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 235 - 242
  • [8] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [9] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [10] Identity-based puncturable signature scheme
    Yang D.
    Chen Y.
    Wei J.
    Hu X.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (12): : 17 - 26