Threshold Ring Signature Scheme Based on TPM

被引:0
|
作者
Bei, Gong [1 ,3 ,4 ]
Wei, Jiang [1 ,3 ,4 ]
Li, Lin [1 ]
Yu, Li [1 ]
Xing, Zhang [2 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
[2] Informat Engn Univ, Inst Elect Technol, Zhengzhou 450004, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing 100049, Peoples R China
[4] Minist Publ Secur, Key Lab Informat & Network Secur, Res Inst 3, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金;
关键词
ring signature; TPM; threshold; Chinese remainder theorem; rank;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature scheme. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [1] A multivariate based threshold ring signature scheme
    Petzoldt, Albrecht
    Bulygin, Stanislav
    Buchmann, Johannes
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 24 (3-4) : 255 - 275
  • [2] A multivariate based threshold ring signature scheme
    Albrecht Petzoldt
    Stanislav Bulygin
    Johannes Buchmann
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2013, 24 : 255 - 275
  • [3] Threshold ring signature scheme based on the curve
    Kuwakado, H
    Tanaka, H
    [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 139 - 139
  • [4] A Lattice-Based Threshold Ring Signature Scheme
    Cayrel, Pierre-Louis
    Lindner, Richard
    Ruckert, Markus
    Silva, Rosemberg
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2010, 2010, 6212 : 255 - +
  • [5] A New Multivariate Based Threshold Ring Signature Scheme
    Zhang, Jingwan
    Zhao, Yiming
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 526 - 533
  • [6] A separable threshold ring signature scheme
    Liu, JK
    Wei, VK
    Wong, DS
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 12 - 26
  • [7] Improved Lattice-Based Threshold Ring Signature Scheme
    Bettaieb, Slim
    Schrek, Julien
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 34 - 51
  • [8] A Novel Lattice-Based Threshold Ring Signature Scheme
    Akleylek, Sedat
    Soysaldi, Meryem
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 219 - 223
  • [9] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [10] An efficient code-based threshold ring signature scheme
    Assidi, Hafsa
    Ayebie, Edoukou Berenger
    Souidi, El Mamoun
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 52 - 60