Nominative signature from ring signature

被引:0
|
作者
Liu, Dennis Y. W. [1 ]
Chang, Shuang [1 ]
Wong, Duncan S. [1 ]
Mu, Yi [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Univ Wollongong, Ctr Informat Secur Res, Sch Informat Technol & Comp Sci, Wollongong, NSW 2522, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the introduction of nominative signature (NS) in 1996, there have been a handful of schemes proposed and almost all of them have been found flawed. The only one which is secure requires multi-round of communications between the nominator and the nominee for signature generation. In this paper, we propose a novel construction which is efficient and requires only one-move communication for signature generation. We also show that the construction is secure under the strongest security model currently available and the reductionist proofs only rely on standard number-theoretic assumptions. As of independent interest, our construction illustrates an interesting use of ring signature.
引用
收藏
页码:396 / +
页数:3
相关论文
共 50 条
  • [31] Lattice-based nominative signature using pseudorandom function
    Kansal, Meenakshi
    Dutta, Ratna
    Mukhopadhyay, Sourav
    IET INFORMATION SECURITY, 2021, 15 (04) : 317 - 332
  • [32] An efficient ring signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2015, 300 : 63 - 69
  • [33] Ambiguous One-Move Nominative Signature Without Random Oracles
    Liu, Dennis Y. W.
    Wong, Duncan S.
    Huang, Qiong
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 325 - 341
  • [34] Modified Huang-Wang's Convertible Nominative Signature Scheme
    Zhao, Wei
    Ye, Dingfeng
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2090 - 2095
  • [35] A (k, n) threshold nominative proxy signature scheme for electronic commerce
    Xin, Xiang-Jun
    Wang, Mei-Zhi
    Xiao, Guo-Zhen
    Journal of China University of Mining and Technology, 2006, 16 (04): : 470 - 474
  • [36] A new ring signature scheme
    Toluee, Rahim
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [37] Ring blind signature scheme
    Hu, Chengyu
    Li, Daxing
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 869 - +
  • [38] A provable encrypted ring signature from bilinear pairings
    Miao, FY
    Xiong, Y
    Yang, SB
    Wang, XF
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (02): : 204 - 208
  • [39] Ring signature with designated linkability
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 104 - 119
  • [40] Certificateless Threshold Ring Signature
    Chang, Shuang
    Wong, Duncan S.
    Mu, Yi
    Zhang, Zhenfeng
    INFORMATION SCIENCES, 2009, 179 (20) : 3685 - 3696