A ring signature scheme based on the Nyberg-Rueppel signature scheme

被引:0
|
作者
Gao, CZ [1 ]
Yao, ZA
Li, L
机构
[1] Sun Yat Sen Univ, Inst Software, Guangzhou 510275, Peoples R China
[2] Sun Yat Sen Univ, Coll Math & Computat Sci, Guangzhou 510275, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ring signature allows to specify a set of possible signers without revealing which member actually produced the signature. This concept was first formalized in 2001 by Rivest, Shamir, and Tauman[3]. Authors of [3] also proposed two versions of ring signature scheme. However, to achieve the goal of anonymity, each user should do much computation in the initial procedure: they should do much work to generate their private and public keys, e.g. in the RSA version, each user should find n(i) such that it is the product of two distinct large prime and compute his private/public keys. Moreover, one should extend the one-way trapdoor functions to a common domain since these functions are computed in different domains. This paper's main contribution is to present a version of ring signature scheme which uses a common modulus. Thus, Our proposed scheme is much more efficient in the setup procedure. Further more, the size of public and private keys are reduced.
引用
收藏
页码:169 / 175
页数:7
相关论文
共 50 条
  • [41] An efficient proxy ring signature scheme
    National Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China
    不详
    Beijing Youdian Daxue Xuebao, 2007, 3 (23-26):
  • [42] Certificateless Linkable Ring Signature Scheme
    Deng, Lunzhi
    Shi, Hongyu
    Gao, Yan
    IEEE ACCESS, 2020, 8 (08): : 54641 - 54651
  • [43] A separable threshold ring signature scheme
    Liu, JK
    Wei, VK
    Wong, DS
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 12 - 26
  • [44] An Efficient Heterogeneous Ring Signature Scheme
    Zhou, Caixue
    International Journal of Network Security, 2022, 24 (05) : 904 - 912
  • [45] A blind signature scheme based on ElGamal signature
    Mohammed, E
    Emarah, AE
    El-Shennawy, K
    IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 51 - 53
  • [46] The proxy signature scheme based on the NTRUSign signature
    Zhuo, Zepeng
    Wei, Shimin
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 302 - 305
  • [47] A Quantum Concurrent Signature Scheme Based on the Quantum Finite Automata Signature Scheme
    Wang, Hongji
    Yao, Gang
    Wang, Beizhan
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2020, : 125 - 129
  • [48] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [49] Ring signature scheme based on multivariate public key cryptosystems
    Wang, Shangping
    Ma, Rui
    Zhang, Yaling
    Wang, Xiaofeng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (10) : 3973 - 3979
  • [50] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 181 - 192