Ring Signature With Unconditional Anonymity in the Plain Model

被引:3
|
作者
Hara, Keisuke [1 ,2 ]
Tanaka, Keisuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528550, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
关键词
Ring signature; unconditional anonymity; plain model;
D O I
10.1109/ACCESS.2021.3049240
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ring signature allows a user to sign messages as a member of a set of users, which is called the ring. In addition to an unforgeability, ring signature ensures that nobody can detect which member in the ring signs the message. In this paper, we propose the first generic construction of ring signature with unconditional anonymity in the plain model based on the standard assumption. The plain model means that we do not need any setup procedure by trusted third party and not depends on a random oracle methodology. Our scheme is constructed based on a statistical ZAP argument, a lossy encryption scheme, and a standard signature scheme. It is known that all of our building blocks can be instantiated based on the quasi-polynomial learning with errors assumption.
引用
收藏
页码:7762 / 7774
页数:13
相关论文
共 50 条
  • [31] On the definition of anonymity for ring signatures
    Ohkubo, Miyako
    Abe, Masayuki
    PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 157 - +
  • [32] On the definitions of anonymity for ring signatures
    Ohkubo, Miyako
    Abe, Masayuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 272 - 282
  • [33] A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity
    Hwang, Shin-Jia
    Cheng, Kai-Lung
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (02): : 357 - 365
  • [34] A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
    Loh, Jia-Ch'ng
    Heng, Swee-Huay
    Tan, Syh-Yuan
    Kurosawa, Kaoru
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 112 - 125
  • [35] A threshold proxy signature scheme with nonrepudiation and anonymity
    Yuan Yumin
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 1002 - 1010
  • [36] A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity
    Tsang, Patrick P.
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    PROVABLE SECURITY, 2010, 6402 : 166 - +
  • [37] An Anonymity-Revoking Proxy Signature Scheme
    Zhang, Dedong
    Ma, Zhaofeng
    Yang, Yixian
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2906 - 2910
  • [38] A Tightly Secure Multi-party-signature Protocol in the Plain Model
    Wei, Lihao
    Ai, Jieqing
    Liu, Shenghan
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 672 - 677
  • [39] An Efficient Strong Designated-Verifier Ring Signature Scheme Providing One-out-of-All Signer Anonymity
    Hwang, Shin-Jia
    Chen, Jyong-Ye
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2012, 15 (04): : 381 - 390
  • [40] Proxy Authorization Signature with Conditional Anonymity and its Application
    Zhou, Xuanwu
    Wei, Ping
    KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 799 - 803