Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices

被引:0
|
作者
Hu X. [1 ]
Jia H. [1 ]
Liu J. [2 ]
Zhao Z. [1 ]
机构
[1] School of Mathematics and Information Science, Guangzhou University, Guangzhou
[2] Guangdong Provincial Key Laboratory of Information Security Technology, School of Mathematics and Systems Science, Guangdong Polytechnic Normal University, Guangzhou
来源
Int. J. Secur. Netw. | 2023年 / 4卷 / 213-226期
关键词
accumulators; IBRI; identity-based ring identification; zero-knowledge proof of knowledge; ZKPoK;
D O I
10.1504/IJSN.2023.135516
中图分类号
学科分类号
摘要
Identity-based cryptography (IBC) can be applied to scenarios that involve a large number of public keys in each execution. In this paper, we propose an efficient identity-based ring signature scheme on lattices with signature size logarithmic to the cardinality of the ring. To this end, we first construct an efficient identity-based ring identification scheme by combining preimage sampling algorithms and a zero-knowledge proof system for a tree-based accumulator. Then we apply the Fiat-Shamir transformation and obtain a secure identity-based ring signature scheme. We prove its security in the random oracle model under the small integer solution assumption. © 2023 Inderscience Enterprises Ltd.. All rights reserved.
引用
收藏
页码:213 / 226
页数:13
相关论文
共 50 条
  • [1] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    [J]. IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [2] An efficient identity-based ring signature scheme and its extension
    Zhang, Jianhong
    [J]. Computational Science and Its Applications - ICCSA 2007, Pt 2, Proceedings, 2007, 4706 : 63 - 74
  • [3] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [4] Identity-based traceable ring signature scheme on lattice
    Ye Q.
    Chen Q.
    Dou Y.
    Zhang J.
    Tang Y.
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 161 - 168
  • [5] An identity-based ring signature scheme with enhanced privacy
    Gamage, Chandana
    Gras, Ben
    Crispo, Bruno
    Tanenbaum, Andrew S.
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 257 - +
  • [6] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 181 - 192
  • [7] Another efficient identity-based ring signature scheme and its extension
    Zhang, Jianhong
    Ji, Cheng
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 286 - 288
  • [8] Identity-based ring signature scheme based on quadratic residues
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    [J]. High Technology Letters, 2009, 15 (01) : 94 - 100
  • [10] Identity-based Ring Signature Scheme Based on Cubic Residues
    Dong, Xuedong
    Liu, Xinxin
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 897 - 900