EFFICIENT TRACEABLE RING SIGNATURE SCHEME WITHOUT PAIRINGS

被引:25
|
作者
Gu, Ke [1 ]
Dong, Xinying [1 ]
Wang, Linyu [1 ]
机构
[1] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410114, Peoples R China
关键词
Ring signature; traceability; pairings; security model; IDENTITY-BASED SIGNATURES; PROXY SIGNATURE; SECURE; ENCRYPTION;
D O I
10.3934/amc.2020016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although currently several traceable (or linkable) ring signature schemes have been proposed, most of them are constructed on pairings. In this paper, we present an efficient traceable ring signature (TRS) scheme without pairings, which is based on the modified EDL signature (first proposed by D.Chaum et al. in Crypto 92). Compared with other ring signature schemes, the proposed scheme does not employ pairing computation and has some computational advantages, whose security can be reduced to the computational Diffie-Hellman (CDH) and decisional Diffie-Hellman (DDH) assumptions in the random oracle model. Also, the proposed scheme is similar to certificateless signature scheme, where user and key generating center make interaction to generate ring key. We give a formal security model for ring signature and prove that the proposed scheme has the properties of traceability and anonymity.
引用
收藏
页码:207 / 232
页数:26
相关论文
共 50 条
  • [41] An efficient certificateless blind signature scheme without bilinear pairing
    Dong, Guofagn
    Gao, Fei
    Shi, Wenbo
    Gong, Peng
    ANAIS DA ACADEMIA BRASILEIRA DE CIENCIAS, 2014, 86 (02): : 1003 - 1011
  • [42] Efficient identity based signature schemes based on pairings
    Hess, F
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 310 - 324
  • [43] An Efficient Traceable and Revocable Access Control Scheme for Smart Grids
    Lu, Ye
    Wang, Hao
    Jin, Xiaomei
    SYMMETRY-BASEL, 2025, 17 (02):
  • [44] A PROVABLY SECURE PROXY SIGNATURE SCHEME FROM BILINEAR PAIRINGS
    Wang Aiqin Li Jiguo Wang Zhijian (College of Computer & Information Engineering
    JournalofElectronics(China), 2010, 27 (03) : 298 - 304
  • [45] Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings
    Lu, Yang
    Zhang, Quanling
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 881 - 896
  • [46] Efficient Certificateless Proxy Signature Scheme
    Deng, Lunzhi
    Zeng, Jiwen
    Huang, Huawei
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2016, 27 (01) : 85 - 100
  • [47] A new ring signature scheme
    Toluee, Rahim
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [48] An Efficient Lattice-based Proxy Signature Scheme without Trapdoor
    Yang, Chunli
    Qiu, Peigang
    Zheng, Shihui
    Wang, Licheng
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 189 - 194
  • [49] Traceable Threshold Proxy Signature
    Gu, Ke
    Wang, Yong
    Wen, Sheng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (01) : 63 - 79
  • [50] Improvement of a Forward-Secure Ring Signature Scheme
    Wang Jian-dong
    Zou Hui
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1216 - 1218