Identity-Based Ring Signature Schemes for Multiple Domains

被引:0
作者
Ki, JuHee [3 ]
Hwang, Jung Yeon [2 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, CIST, Grad Sch Informat Secur, Seoul, South Korea
[2] Elect & Telecommun Res Inst, Taejon 305606, South Korea
[3] Korea Evaluat Inst Ind Technol KEIT, Taejon, South Korea
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2012年 / 6卷 / 10期
关键词
Identity-Based Ring Signature; Privacy; Anonymity; Separability; Multiple Domains; IDENTIFICATION; PAIRINGS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be selected from arbitrary domains, thereby, giving a signer a wide range of ways to control privacy. In this paper we propose a generic method to construct efficient identity-based ring signature schemes with various levels of separability. We first describe a method to efficiently construct an identity-based ring signature scheme for a single domain, in which a signer can select ring identities by choosing from identities defined only for the domain. Next, we present a generic method for linking ring signatures constructed for a single domain. Using this method, an identity-based ring signature scheme with a compact structure, supporting multiple arbitrary domains can be designed. We show that our method outperforms the best known schemes in terms of signature size and computational costs, and that the security model based on the separability of identity-based ring signatures, presented in this paper, is highly refined and effective by demonstrating the security of all of the proposed schemes, using a model with random oracles.
引用
收藏
页码:2692 / 2707
页数:16
相关论文
共 21 条
  • [1] Abe M, 2002, LECT NOTES COMPUT SC, V2501, P415
  • [2] Adida B., SEPARABLE IDENTITY B
  • [3] Bellare M., 2009, LNCS, V3027, P268
  • [4] Bender A, 2006, LECT NOTES COMPUT SC, V3876, P60
  • [5] Boyen Xavier, 2008, International Journal of Applied Cryptography, V1, P3, DOI 10.1504/IJACT.2008.017047
  • [6] Camenisch J., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P413
  • [7] Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
  • [8] Chow SSM, 2005, LECT NOTES COMPUT SC, V3531, P499
  • [9] Cramer R., 2004, LNCS, V839, P174
  • [10] HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS
    FIAT, A
    SHAMIR, A
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 186 - 194