Identity-based quotable ring signature

被引:7
作者
Wang, Kefeng [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Identity-based cryptography; Quotable signature; Ring signature; REDACTABLE SIGNATURES; DEFINITIONS; ENCRYPTION; SECURE;
D O I
10.1016/j.ins.2015.05.033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new notion of identity-based quotable ring signature. This new cryptographic primitive can be used to derive new ring signatures on substrings of an original message from an original ring signature on the original message, which is generated by the actual signer included in the ring. No matter whether a ring signature is originally generated or is quoted from another valid ring signature, it will convince the verifier that it is generated by one of the ring members, without revealing any information about which ring member is the actual signer. The set of ring members could be arbitrarily selected by the actual signer without need of other ring members' approval. The actual signer is anonymous among this set of ring members. At the same time, the verifier could not distinguish whether a ring signature is originally generated or is quoted from another ring signature. In this paper, we propose a concrete identity-based quotable ring signature scheme based on bilinear pairing. We make use of bilinear groups of composite order. The construction is identity-based to alleviate the problem of certificate verification, especially for applications involving a large number of public keys in each execution such as ring signature schemes. The proposed scheme is proven to be anonymous under the assumption that the Subgroup Decision Problem is hard, selectively unforgeable against adaptively chosen message attacks in the random oracle model under the assumption that the Computational Diffie-Hellman problem is hard, and strongly context hiding. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:71 / 89
页数:19
相关论文
共 50 条
[21]   Efficient Identity-Based Signature from Lattices [J].
Tian, Miaomiao ;
Huang, Liusheng .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 :321-329
[22]   A Survey of Identity-based Signcryption [J].
Li, Fagen ;
Khan, Muhammad Khurram .
IETE TECHNICAL REVIEW, 2011, 28 (03) :265-272
[23]   Identity-based partially blind signature in the standard model for electronic cash [J].
Li, Fagen ;
Zhang, Mingwu ;
Takagi, Tsuyoshi .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) :196-203
[24]   A new identity-based ring signcryption scheme [J].
Deng, Lunzhi ;
Zeng, Jiwen ;
Li, Siwei .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) :333-342
[25]   An Improved Identity-Based Ring Signcryption Scheme [J].
Deng, Lunzhi ;
Liu, Chenglian ;
Wang, Xiangbin .
INFORMATION SECURITY JOURNAL, 2013, 22 (01) :46-54
[26]   A new identity-based ring signcryption scheme [J].
Deng, Lunzhi, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06) :333-342
[27]   Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme [J].
Behnia, Rouzbeh ;
Tan, Syh-Yuan ;
Heng, Swee-Huay .
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 :474-477
[28]   Strong Identity-Based Proxy Signature Schemes, Revisited [J].
Liu, Weiwei ;
Mu, Yi ;
Yang, Guomin ;
Tian, Yangguang .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[29]   Identity-based strong designated verifier signature revisited [J].
Huang, Qiong ;
Yang, Guomin ;
Wong, Duncan S. ;
Susilo, Willy .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (01) :120-129
[30]   Security Proofs for Identity-Based Identification and Signature Schemes [J].
Mihir Bellare ;
Chanathip Namprempre ;
Gregory Neven .
Journal of Cryptology, 2009, 22 :1-61