A New Identity-Based Threshold Ring Signature Scheme

被引:0
作者
Xu, Feng [1 ]
Lv, Xin [1 ]
机构
[1] Hohai Univ, HHU, Coll Comp & Informat, Nanjing, Peoples R China
来源
2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) | 2011年
关键词
ring signature; discrete logarithm problem; bilinear pairings; secret sharing; unforgeability;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Aiming at the security problems existed in most identity-based threshold ring signature (ITRS) schemes, including poor security and inefficient in verifying, a new ITRS scheme is proposed. We significantly enhance the security of signature key by using bilinear pairings and secret sharing techniques. Our analysis indicates that the proposed scheme achieves unconditional anonymity and unforgeability. A security problem (ring member-changing attack) also can be solved. Compared to the congener schemes, ours is much more efficient in signing process.
引用
收藏
页码:2646 / 2651
页数:6
相关论文
共 50 条
[21]   Identity-based Threshold Decryption Scheme Without Random Oracles [J].
Ming Yang ;
Wang Yumin .
CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02) :323-328
[22]   A New Threshold Signature Scheme Based on Bilinear Pairings [J].
Lv, Xin ;
Wang, Zhijian ;
Xu, Feng .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[23]   Logarithmic identity-based ring signature over lattices and linkable variant [J].
Gao, Wen ;
Fu, Tianyou ;
Qin, Baodong ;
Dong, Xiaoli ;
Zhao, Zhen ;
Liu, Momeng .
COMPUTER STANDARDS & INTERFACES, 2026, 95
[24]   A new ring signature scheme [J].
Toluee, Rahim ;
Asaar, Maryam Rajabzadeh ;
Salmasizadeh, Mahmoud .
2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
[25]   Identity-based Verifiably Committed Signature Scheme without Random Oracles [J].
孙迅 ;
李建华 ;
陈恭亮 .
JournalofShanghaiJiaotongUniversity, 2008, (01) :110-115
[26]   Provable secure identity-based multi-proxy signature scheme [J].
Sahu, Rajeev Anand ;
Padhye, Sahadeo .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) :497-512
[27]   Analysis and improvement of a provable secure fuzzy identity-based signature scheme [J].
Xiong Hu ;
Chen YaNan ;
Zhu GuoBin ;
Qin ZhiGuang .
SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) :1-5
[28]   Analysis and improvement of a provable secure fuzzy identity-based signature scheme [J].
Hu Xiong ;
YaNan Chen ;
GuoBin Zhu ;
ZhiGuang Qin .
Science China Information Sciences, 2014, 57 :1-5
[29]   Identity-based verifiably committed signature scheme without random oracles [J].
Xun Sun ;
Jian-hua Li ;
Gong-liang Chen .
Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) :110-115
[30]   Identity-based Convertible Limited Verifier Signature Scheme in the Standard Model [J].
Shen Xiaoqin ;
Ming Yang .
MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, PTS 1 AND 2, 2011, 48-49 :599-+