Attribute-based ring signature scheme with constant-size signature

被引:11
|
作者
Wenqiang, W. [1 ]
Shaozhen, C. [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1049/iet-ifs.2009.0189
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An attribute-based ring signature scheme with constant size and constant number of pairings computation is proposed. The signer signs messages by using a subset of its attributes. All the users who possess the subset of these attributes form a ring. It requires that anyone cannot tell who generates the signature in this ring. Furthermore, anyone out of this ring could not forge the signature on behalf of the ring. It is proved to be unforgeable in the standard model and unconditionally anonymous. To the best of the authors' knowledge, such a construction is introduced for the first time.
引用
收藏
页码:104 / 110
页数:7
相关论文
共 50 条
  • [21] ID-based deniable ring signature with constant-size signature and its extention
    Hu, Chengyu
    Liu, Pengtao
    Journal of Computational Information Systems, 2010, 6 (11): : 3549 - 3558
  • [22] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +
  • [23] ID-based deniable ring authentication with constant-size signature
    Wang L.
    Zhang G.
    Ma C.
    Frontiers of Computer Science in China, 2008, 2 (01): : 106 - 112
  • [24] Attribute-based encryption schemes with constant-size ciphertexts
    Attrapadung, Nuttapong
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    de Panafieu, Elie
    Rafols, Carla
    THEORETICAL COMPUTER SCIENCE, 2012, 422 : 15 - 38
  • [25] Verifiable outsourced attribute-based signature scheme
    Yanli Ren
    Tiejin Jiang
    Multimedia Tools and Applications, 2018, 77 : 18105 - 18115
  • [26] Efficient attribute-based ring signature schemes
    Chen, Shaozhen
    Wang, Wenqiang
    Peng, Shujuan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (12): : 2075 - 2082
  • [27] Verifiable outsourced attribute-based signature scheme
    Ren, Yanli
    Jiang, Tiejin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18105 - 18115
  • [28] An attribute-based signature scheme from lattices
    Li, Mingxiang
    An, Ni
    Feng, Erying
    Pang, Ling
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2015, 47 (02): : 102 - 107
  • [29] A New Constant-Size Group Signature Scheme From Lattices
    Luo, Qin
    Jiang, Chun-Yang
    IEEE ACCESS, 2020, 8 : 10198 - 10207
  • [30] Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext
    Zhu, Guo-Bin
    Xie, Xin
    Zhang, Xing
    Zhao, Yang
    Xiong, Hu
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (01): : 76 - 83