ID-based Deniable Threshold Ring Authentication

被引:0
作者
Jin, Chunhua [1 ]
Xu, Chunxiang [1 ]
Jiang, Linzhi [1 ,2 ]
Li, Fagen [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] West AnHui Univ, Sch Finance & Math, Lu An 237012, Peoples R China
来源
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS) | 2015年
关键词
Deniable threshold ring authentication; Anonymous; Privacy; Identity-based cryptography; Random oracle model; SIGNATURE;
D O I
10.1109/HPCC-CSS-ICESS.2015.149
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Deniable threshold ring authentication allows at least.. members of a group participants to authenticate a message.. without revealing which.. members have generated the authenticator, and the verifier cannot convince any third party the message.. is authenticated. It can be applied in anonymous and privacy communication scenarios. In this paper, we present a non-interactive identity-based deniable threshold ring authentication scheme. Our scheme is provably secure in the random oracle model under the bilinear Diffie-Hellman assumption. To the best of our knowledge, our scheme is the first identity based deniable threshold ring authentication scheme. Our scheme is very efficient since it only requires one pairing operation in authentication phase and one pairing operation in verification phase regardless of the number of the ring.
引用
收藏
页码:1779 / 1784
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2005, LECT NOTES COMPUTER
[2]  
[Anonymous], 2013, CHONGQING LIGONGXUE
[3]  
Bresson E, 2002, LECT NOTES COMPUT SC, V2442, P465
[4]   Two new identity-based threshold ring signature schemes [J].
Deng, Lunzhi ;
Zeng, Jiwen .
THEORETICAL COMPUTER SCIENCE, 2014, 535 :38-45
[5]  
Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
[6]  
Gambs Sebastien., 2014, ASIACCS 14, P501
[7]  
Herranz J, 2004, LECT NOTES COMPUT SC, V3269, P27
[8]   ID-based deniable ring authentication with constant-size signature [J].
Wang L. ;
Zhang G. ;
Ma C. .
Frontiers of Computer Science in China, 2008, 2 (01) :106-112
[9]  
Naor M, 2002, LECT NOTES COMPUT SC, V2442, P481
[10]  
Rivest R. L., 2001, P 7 INT C THEOR APPL, P552, DOI [DOI 10.1007/3-540-45682-132, DOI 10.1007/3-540-45682-1_32]