A new ring signature scheme with signer-admission property

被引:15
作者
Wang, Chih-Hung [1 ]
Liu, Chih-Yu [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
关键词
ring signature; designated confirmer signatures; designated verifier proofs;
D O I
10.1016/j.ins.2006.03.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper. we introduce an extended ring signature scheme in which the actual signer has the ability to admit to having signed a document at his will. Generally speaking, this scheme can be considered as an extension and improvement of the ring signature suggested by Rivest et al. in 2001. The proposed scheme is called signer-admission ring signature which combines the idea of the designated confirmer signatures proposed by Chaum in 1994 and the designated verifier proofs proposed by Jakobsson et al. in 1996. This paper presents a scenario explaining why the signer-admission property is valuable in real-life applications. An actual signer may possibly want to expose himself if, in doing so, he will acquire an enormous benefit. Here, we propose a generic construction of the signer-admission ring signature as well as a demonstration modified from Rivest et al.'s scheme to achieve signer-admission. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:747 / 754
页数:8
相关论文
共 50 条
[41]   A Novel Ring Signature Scheme with Multi-designated Verifiers [J].
Zhang, Jianhong ;
Xie, Jianjun .
2008 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2008, :348-+
[42]   Ring signature scheme for ECC-based anonymous signcryption [J].
Chung, Yu Fang ;
Wu, Zhen Yu ;
Chen, Tzer Shyong .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) :669-674
[43]   Analysis of Revocable-iff-Linked Ring Signature Scheme [J].
Jeong, Ik Rae ;
Kwon, Jeong Ok ;
Lee, Dong Hoon .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) :322-325
[44]   An efficient code-based threshold ring signature scheme [J].
Assidi, Hafsa ;
Ayebie, Edoukou Berenger ;
Souidi, El Mamoun .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 :52-60
[45]   Secure Ring Signature Scheme for Privacy-Preserving Blockchain [J].
Wang, Lin ;
Peng, Changgen ;
Tan, Weijie .
ENTROPY, 2023, 25 (09)
[46]   Cryptanalysis of a non-interactive deniable ring signature scheme [J].
Jia, Huiwen ;
Tang, Chunming .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) :103-112
[47]   Cryptanalysis of a non-interactive deniable ring signature scheme [J].
Huiwen Jia ;
Chunming Tang .
International Journal of Information Security, 2021, 20 :103-112
[48]   Identity verifiable ring signature scheme for privacy protection in blockchain [J].
Devidas S. ;
Rekha N.R. ;
Subba Rao Y.V. .
International Journal of Information Technology, 2023, 15 (5) :2559-2568
[49]   A New Framework for Conditionally Anonymous Ring Signature [J].
Zeng, Shengke ;
Jiang, Shaoquan .
COMPUTER JOURNAL, 2014, 57 (04) :567-578
[50]   Identity-based ring signature scheme based on quadratic residues [J].
Xiong, Hu ;
Qin, Zhiguang ;
Li, Fagen .
High Technology Letters, 2009, 15 (01) :94-100