Enhanced security models and a generic construction approach for linkable ring signature

被引:22
作者
Liu, Joseph K.
Wong, Duncan S.
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
ring signature; linkability; anonymity;
D O I
10.1142/S0129054106004480
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A ring signature scheme is a group signature scheme but with no group manager to setup a group or revoke a signer's identity. It allows members of a group to sign messages such that the resulting signatures do not reveal the identities of the group members who actually created these signatures (anonymity) and no one can tell if two signatures are created by the same signer (unlinkability). Furthermore, the formation of a group is spontaneous. Diversion group members (non-signers) can be totally unaware of being conscripted to the group. The notion of linkable ring signature, introduced by Liu et al. in 2004, also provides signer anonymity and spontaneity, but at the same time, allows anyone to determine whether two signatures have been issued by the same group member (linkability). In this paper, we propose a suite of enhanced security models and show that they capture stronger notions of signer anonymity and linkability than the original ones proposed by Liu et al. in 2004. We also propose a generic approach for constructing a linkable ring signature scheme. The generic approach leads us to the construction of two efficient polynomial-structured schemes and one type-restricted separable scheme. The separable scheme allows group members to have different sets of DL (discrete logarithm) domain parameters. All schemes are shown secure under the enhanced security models defined in this paper.
引用
收藏
页码:1403 / 1422
页数:20
相关论文
共 27 条
[1]  
Abe M, 2004, IEICE T FUND ELECTR, VE87A, P131
[2]  
Abe M, 2002, LECT NOTES COMPUT SC, V2501, P415
[3]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P614
[4]  
Bellare Mihir, 1993, P 1 ACM C COMP COMM, P62, DOI DOI 10.1145/168588.168596
[5]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[6]  
Bresson E, 2002, LECT NOTES COMPUT SC, V2442, P465
[7]  
BRESSON E, 2002, THRESHOLD RING SIGNA
[8]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[9]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
[10]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88