Identity-based quotable ring signature

被引:7
|
作者
Wang, Kefeng [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Identity-based cryptography; Quotable signature; Ring signature; REDACTABLE SIGNATURES; DEFINITIONS; ENCRYPTION; SECURE;
D O I
10.1016/j.ins.2015.05.033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive can be used to derive new ring signatures on substrings of an original message from an original ring signature on the original message, which is generated by the actual signer included in the ring. No matter whether a ring signature is originally generated or is quoted from another valid ring signature, it will convince the verifier that it is generated by one of the ring members, without revealing any information about which ring member is the actual signer. The set of ring members could be arbitrarily selected by the actual signer without need of other ring members' approval. The actual signer is anonymous among this set of ring members. At the same time, the verifier could not distinguish whether a ring signature is originally generated or is quoted from another ring signature. In this paper, we propose a concrete identity-based quotable ring signature scheme based on bilinear pairing. We make use of bilinear groups of composite order. The construction is identity-based to alleviate the problem of certificate verification, especially for applications involving a large number of public keys in each execution such as ring signature schemes. The proposed scheme is proven to be anonymous under the assumption that the Subgroup Decision Problem is hard, selectively unforgeable against adaptively chosen message attacks in the random oracle model under the assumption that the Computational Diffie-Hellman problem is hard, and strongly context hiding. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:71 / 89
页数:19
相关论文
共 50 条
  • [1] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [2] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [3] New identity-based ring signature schemes
    Herranz, J
    Sáez, G
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 27 - 39
  • [4] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [5] Identity-based traceable ring signature scheme on lattice
    Ye Q.
    Chen Q.
    Dou Y.
    Zhang J.
    Tang Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 161 - 168
  • [6] Identity-Based Linkable Ring Signature on NTRU Lattice
    Tang, Yongli
    Xia, Feifei
    Ye, Qing
    Wang, Mengyao
    Mu, Ruijie
    Zhang, Xiaohang
    Security and Communication Networks, 2021, 2021
  • [7] Identity-Based Linkable Ring Signature on NTRU Lattice
    Tang, Yongli
    Xia, Feifei
    Ye, Qing
    Wang, Mengyao
    Mu, Ruijie
    Zhang, Xiaohang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Fuzzy Identity-Based Ring Signature from Lattices
    Cao, Chengtang
    You, Lin
    Hu, Gengran
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [9] Identity-based Threshold Ring Signature Without Pairings
    Xiong Hu
    Qin ZhiGuang
    Li Fagen
    Jin Jing
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 537 - 541
  • [10] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 181 - 192