Provably Secure Code-Based Threshold Ring Signatures

被引:0
|
作者
Dallot, Leonard [1 ]
Vergnaud, Damien [2 ]
机构
[1] Univ Caen, CREYC, UMR 6072, Campus Cote Nacre,Blvd Marechal Juin, F-14050 Caen, France
[2] CNRS, INRIA, Ecole Normale Super, F-75700 Paris 05, France
来源
关键词
RANDOM-ORACLE MODEL; AD-HOC GROUPS; IDENTIFICATION; CRYPTOSYSTEMS; EQUIVALENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A threshold ring signature scheme enables a set of users to sign a message such that a finite set of possible signers (the ring) is identified, without revealing which subset of ring members actually produced the signature. A recent proposal of Aguillar et al. introduced the first code-based threshold ring signature scheme which large signatures (about 20KBytes per member of the ring for 80-bit security). We propose a new code-based threshold ring signature scheme that achieves small signature size of 675N-228l bits, where N is the number of members in the ring and l is the number of signers, for a security level of 80 bits. We give a security proof of our scheme whose security relies - in both random oracle and ideal cipher models - on two coding theory problems, making our scheme the first provably secure code-based threshold ring signature scheme. Unfortunately, as often in code-based cryptography, the presented scheme leads to very large public keys.
引用
收藏
页码:222 / +
页数:4
相关论文
共 50 条
  • [1] A provably secure code-based concurrent signature scheme
    Asaar, Maryam Rajabzadeh
    Ameri, Mohammad Hassan
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    IET INFORMATION SECURITY, 2018, 12 (01) : 34 - 41
  • [2] A Provably Secure Group Signature Scheme from Code-Based Assumptions
    Ezerman, Martianus Frederic
    Lee, Hyung Tae
    Ling, San
    Khoa Nguyen
    Wang, Huaxiong
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 260 - 285
  • [3] Provably Secure Group Signature Schemes From Code-Based Assumptions
    Ezerman, Martianus Frederic
    Lee, Hyung Tae
    Ling, San
    Nguyen, Khoa
    Wang, Huaxiong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (09) : 5754 - 5773
  • [4] Provably secure blind threshold signatures based on discrete logarithm
    Lei, CL
    Juang, WS
    Yu, PL
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2002, 18 (01) : 23 - 39
  • [5] A provably secure code-based short signature scheme and its nontransferable variant
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)
  • [6] An efficient code-based threshold ring signature scheme
    Assidi, Hafsa
    Ayebie, Edoukou Berenger
    Souidi, El Mamoun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 52 - 60
  • [7] A New Code-Based Linkable Threshold Ring Signature Scheme
    Ren, Fang
    Xiu, Haiyan
    Ji, Chuxin
    Zheng, Dong
    Wu, Ziyi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [8] On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures
    Ren, Yan
    Zhao, Qiuxia
    Guan, Haipeng
    Lin, Zhiqiang
    IEEE ACCESS, 2020, 8 : 17854 - 17862
  • [9] Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
    Wang, Yong
    Ismail, Eddie Shahril
    MATHEMATICS, 2024, 12 (15)
  • [10] A Secure and Efficient Code-Based Signature Scheme
    Liu, Xiangxin
    Yang, Xiaoyuan
    Han, Yiliang
    Wang, Xu An
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 635 - 645