An Efficient Attribute-Based Ring Signature Scheme

被引:3
|
作者
Wang Wenqiang [1 ]
Chen Shaozhen [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Peoples R China
来源
2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS | 2009年
关键词
ring signature; attribute-based; anonymity; computational Diffie-Hellman assumption;
D O I
10.1109/IFCSTA.2009.43
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An efficient attribute-based ring signature scheme is proposed in this paper. The signer signs message by using subset of its attributes. Let all the users with this attributes subset be a ring. It requires that anyone can not tell who generates the signature in this ring. Furthermore, anyone could not forge the signature for this ring if it not in this ring. It is proved to be unforgeable in the random oracle model and is unconditional anonymous. This new scheme is more efficient and flexible than the previous identify-based ring signature schemes. Compared with the existing attribute-based ring signature schemes, the length of the signature decreases by 1/3, and the pairing operations in our schemes also decrease by 1/3. Thus the efficiency of signing and verifying improves greatly.
引用
收藏
页码:147 / 150
页数:4
相关论文
共 50 条
  • [21] An efficient ring signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2015, 300 : 63 - 69
  • [22] Decentralized Attribute-Based Server-Aid Signature in the Internet of Things
    Li, Jiguo
    Chen, Yu
    Han, Jinguang
    Liu, Chengdong
    Zhang, Yichen
    Wang, Huaqun
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06): : 4573 - 4583
  • [23] Secure Attribute-based Threshold Signature without a Trusted Central Authority
    Sun Changxia
    Ma Wenping
    JOURNAL OF COMPUTERS, 2012, 7 (12) : 2899 - 2905
  • [24] Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
    Tan, Syh-Yuan
    Yeow, Kin-Woon
    Hwang, Seong Oun
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04): : 6384 - 6395
  • [25] Attribute-Based Re-Encryption Scheme in the Standard Model
    GUO Shanqing1
    2. State Key Laboratory of Novel Software Technology
    WuhanUniversityJournalofNaturalSciences, 2008, (05) : 621 - 625
  • [26] Hidden attribute-based signatures without anonymity revocation
    Li, Jin
    Kim, Kwangjo
    INFORMATION SCIENCES, 2010, 180 (09) : 1681 - 1689
  • [27] EFFICIENT TRACEABLE RING SIGNATURE SCHEME WITHOUT PAIRINGS
    Gu, Ke
    Dong, Xinying
    Wang, Linyu
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2020, 14 (02) : 207 - 232
  • [28] An Efficient Blind Ring Signature Scheme without Pairings
    Zhang, Jianhong
    Chen, Hua
    Liu, Xue
    Liu, Chenglian
    WEB-AGE INFORMATION MANAGEMENT, 2010, 6185 : 177 - +
  • [29] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [30] Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials
    Han, Jinguang
    Chen, Liqun
    Schneider, Steve
    Treharne, Helen
    Wesemeyer, Stephan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1836 - 1849