Nominative signature from ring signature

被引:0
|
作者
Liu, Dennis Y. W. [1 ]
Chang, Shuang [1 ]
Wong, Duncan S. [1 ]
Mu, Yi [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Univ Wollongong, Ctr Informat Secur Res, Sch Informat Technol & Comp Sci, Wollongong, NSW 2522, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the introduction of nominative signature (NS) in 1996, there have been a handful of schemes proposed and almost all of them have been found flawed. The only one which is secure requires multi-round of communications between the nominator and the nominee for signature generation. In this paper, we propose a novel construction which is efficient and requires only one-move communication for signature generation. We also show that the construction is secure under the strongest security model currently available and the reductionist proofs only rely on standard number-theoretic assumptions. As of independent interest, our construction illustrates an interesting use of ring signature.
引用
收藏
页码:396 / +
页数:3
相关论文
共 50 条
  • [41] Identity Based Threshold Ring Signature from Lattices
    Wei, Baodian
    Du, Yusong
    Zhang, Huang
    Zhang, Fangguo
    Tian, Haibo
    Gao, Chongzhi
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 233 - 245
  • [42] Ring Signature Schemes from Lattice Basis Delegation
    Wang, Jin
    Sun, Bo
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 15 - 28
  • [43] Deniable ring signature scheme based on the ISRSAC digital signature algorithm
    Zhang, Yanshuo
    Yuan, Yuqi
    Liu, Ning
    Chen, Ying
    Dong, Youheng
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [44] Fully Anonymous Blockchain Constructed Based on Aggregate Signature and Ring Signature
    Chen, Tianfu
    Qi, Zhenghua
    Cheng, Jiagen
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 250 - 261
  • [45] Deniable ring signature scheme based on the ISRSAC digital signature algorithm
    Zhang, Yanshuo
    Yuan, Yuqi
    Liu, Ning
    Chen, Ying
    Dong, Youheng
    PeerJ Computer Science, 2024, 10
  • [46] A ring signature scheme based on the Nyberg-Rueppel signature scheme
    Gao, CZ
    Yao, ZA
    Li, L
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 169 - 175
  • [47] Designated verifier ring signature and ring signcryption
    Fu, X. (xtfu@mail.xidian.edu.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07):
  • [48] Revocable Attribute-Based Ring Signature Scheme with Constant Size Signature
    Yang, Tonghao
    Yu, Bin
    Wang, Hengjun
    Li, Junquan
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 100 - 104
  • [49] Identity-based ring signature scheme with constant-size signature
    Wang, Ling-Ling
    Zhang, Guo-Yin
    Ma, Chun-Guang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (11): : 2645 - 2648
  • [50] Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes
    Shim, Kyung-Ah
    An, Youngjoo
    IEEE ACCESS, 2021, 9 : 134427 - 134434