Identity-Based Linkable Ring Signature Scheme

被引:14
作者
Deng, Lunzhi [1 ]
Jiang, Yuhong [1 ]
Ning, Bingqin [1 ]
机构
[1] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Identity-based cryptography; ring signature; linkable; pairing; random oracle model; LINKABILITY;
D O I
10.1109/ACCESS.2019.2948972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A ring signature is an anonymous signature that implements both the authentication of the message and the anonymity of the signer. In a "normal" ring signature scheme, the same signer can generate multiple ring signatures, but the verifier cannot find this fact. Linkable ring signature (LRS) solves the problem. In the setting, the identity of the signer is still anonymous, and if the same signer generates multiple ring signatures, the verifier can confirm the fact. Linkable ring signatures are applied to some actual scenarios, such as e-cash, e-voting and ad-hoc network authentication. In this paper, we presented a new identity-based linkable ring signature scheme that avoids certificate management. We then gave the security proofs in the random oracle model (ROM) and compared the efficiency of it with the previous schemes. The new scheme requires only 7 pairing operations in signing and verifying. It is the most efficient linkable ring signature in the identity-based setting.
引用
收藏
页码:153969 / 153976
页数:8
相关论文
共 28 条
[1]  
[Anonymous], 2004, LECT NOTES COMPUT SC
[2]  
Au MH, 2006, LECT NOTES COMPUT SC, V4329, P364
[3]   Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction [J].
Au, Man Ho ;
Liu, Joseph K. ;
Susilo, Willy ;
Yuen, Tsz Hon .
THEORETICAL COMPUTER SCIENCE, 2013, 469 :1-14
[4]  
Baum Carsten, 2018, Information and Communications Security. 20th International Conference, ICICS 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11149), P303, DOI 10.1007/978-3-030-01950-1_18
[5]   Forward-Secure Linkable Ring Signatures [J].
Boyen, Xavier ;
Haines, Thomas .
INFORMATION SECURITY AND PRIVACY, 2018, 10946 :245-264
[6]   Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols [J].
Chen, Siyuan ;
Zeng, Peng ;
Choo, Kim-Kwang Raymond ;
Dong, Xiaolei .
COMPUTER JOURNAL, 2018, 61 (04) :545-560
[7]  
Chow SSM, 2006, LECT NOTES COMPUT SC, V4341, P175
[8]  
Chow SSM, 2005, LECT NOTES COMPUT SC, V3531, P499
[9]   Two new identity-based threshold ring signature schemes [J].
Deng, Lunzhi ;
Zeng, Jiwen .
THEORETICAL COMPUTER SCIENCE, 2014, 535 :38-45
[10]   Sub-Linear Size Traceable Ring Signatures without Random Oracles [J].
Fujisaki, Eiichiro .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) :151-166