An efficient multivariate threshold ring signature scheme

被引:10
|
作者
Duong, Dung H. [1 ]
Tran, Ha T. N. [2 ]
Susilo, Willy [1 ]
Le Van Luyen [3 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
[2] Concordia Univ Edmonton, Dept Math & Phys Sci, 7128 Ada Blvd NW, Edmonton, AB T5H 1M5, Canada
[3] Univ Sci, Fac Math & Comp Sci, VNU HCMC, 227 Nguyen Van Cu,Dist 5, Ho Chi Minh City, Vietnam
基金
澳大利亚研究理事会;
关键词
Post-quantum cryptography; Multivariate cryptography; Threshold ring signature; MQ problem; IDENTIFICATION;
D O I
10.1016/j.csi.2020.103489
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability 2/3. Petzoldt et al. (AAECC 2013) extended that protocol into a threshold ring signature scheme, which later was improved by Zhang and Zhao (NSS 2014). In 2015, Monteiro et al. (IEICE 2015) improved the 3-pass identification protocol of Sakumoto et al. to the one with impersonation probability 1/2. In this paper, we utilize the previous methods and the protocol by Monteiro et al. (2015)[20] to propose an efficient threshold ring signature. As a result, our scheme is more efficient than all previous multivariate threshold signature schemes in terms of both communication cost and signature length. In particular, the signature length of our scheme is 40% and 22% shorter than that of Petzoldt et al. and Zhang-Zhao respectively.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] An efficient static blind ring signature scheme
    Wu, Qianhong
    Zhang, Fanguo
    Susilo, Willy
    Mu, Yi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 410 - 423
  • [32] An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model
    Zhou, Guomin
    Zeng, Peng
    Yuan, Xiaohui
    Chen, Siyuan
    Choo, Kim-Kwang Raymond
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [33] Ring signature scheme based on multivariate public key cryptosystems
    Wang, Shangping
    Ma, Rui
    Zhang, Yaling
    Wang, Xiaofeng
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (10) : 3973 - 3979
  • [34] An Efficient Threshold Key-Insulated Signature Scheme
    陈剑洪
    龙宇
    陈克非
    王永涛
    李祥学
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 658 - 662
  • [35] An efficient threshold key-insulated signature scheme
    Chen J.-H.
    Long Y.
    Chen K.-F.
    Wang Y.-T.
    Li X.-X.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (6) : 658 - 662
  • [36] An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Chen, Tzer-Long
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3027 - 3032
  • [37] Improved Lattice-Based Threshold Ring Signature Scheme
    Bettaieb, Slim
    Schrek, Julien
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 34 - 51
  • [38] A Novel Lattice-Based Threshold Ring Signature Scheme
    Akleylek, Sedat
    Soysaldi, Meryem
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 219 - 223
  • [39] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [40] An Efficient Attribute-Based Ring Signature Scheme
    Wang Wenqiang
    Chen Shaozhen
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 147 - 150