Nominative signature from ring signature

被引:0
|
作者
Liu, Dennis Y. W. [1 ]
Chang, Shuang [1 ]
Wong, Duncan S. [1 ]
Mu, Yi [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Univ Wollongong, Ctr Informat Secur Res, Sch Informat Technol & Comp Sci, Wollongong, NSW 2522, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the introduction of nominative signature (NS) in 1996, there have been a handful of schemes proposed and almost all of them have been found flawed. The only one which is secure requires multi-round of communications between the nominator and the nominee for signature generation. In this paper, we propose a novel construction which is efficient and requires only one-move communication for signature generation. We also show that the construction is secure under the strongest security model currently available and the reductionist proofs only rely on standard number-theoretic assumptions. As of independent interest, our construction illustrates an interesting use of ring signature.
引用
收藏
页码:396 / +
页数:3
相关论文
共 50 条
  • [1] Nominative Proxy Ring Signature
    Hu, Chengyu
    Liu, Pengtao
    Zhang, Guoyan
    SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, : 225 - +
  • [2] A New Nominative Signature Scheme
    Xin, Xiangjun
    Li, Fagen
    EIGHTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2009, : 910 - 915
  • [3] Improvement on nominative proxy signature schemes
    Institute of Information and Management, Jiangxi University of Finance and Economics, Nanchang 330013, Jiangxi Province, China
    不详
    Int. J. Netw. Secur., 2008, 2 (175-180):
  • [4] Formal definition and construction of nominative signature
    Liu, Dennis Y. W.
    Wong, Duncan S.
    Huang, Xinyi
    Wang, Guilin
    Huang, Qiong
    Mu, Yi
    Susilo, Willy
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 57 - +
  • [5] A more efficient convertible nominative signature
    Liu, Dennis Y. W.
    Chang, Shuang
    Wong, Duncan S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 214 - 221
  • [6] Security remarks on a convertible nominative signature scheme
    Wang, Guilin
    Bao, Feng
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 265 - +
  • [7] An improved nominative proxy signature for mobile communication
    Zhang, JH
    Wu, QH
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (07): : 1697 - 1699
  • [8] Provably Secure Convertible Nominative Signature Scheme
    Zhao, Wei
    Lin, Changlu
    Ye, Dingfeng
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 23 - 40
  • [9] Ring signature based on ElGamal signature
    Ren, Jian
    Harn, Lein
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 445 - 456
  • [10] Certificateless Nominative Signature Scheme based upon DLP
    Mohanty, Sujata
    Sahoo, Sujit Sangram
    Majhi, Banshidhar
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1241 - 1245