Provably Secure Code-Based Threshold Ring Signatures

被引:0
|
作者
Dallot, Leonard [1 ]
Vergnaud, Damien [2 ]
机构
[1] Univ Caen, CREYC, UMR 6072, Campus Cote Nacre,Blvd Marechal Juin, F-14050 Caen, France
[2] CNRS, INRIA, Ecole Normale Super, F-75700 Paris 05, France
来源
关键词
RANDOM-ORACLE MODEL; AD-HOC GROUPS; IDENTIFICATION; CRYPTOSYSTEMS; EQUIVALENT;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A threshold ring signature scheme enables a set of users to sign a message such that a finite set of possible signers (the ring) is identified, without revealing which subset of ring members actually produced the signature. A recent proposal of Aguillar et al. introduced the first code-based threshold ring signature scheme which large signatures (about 20KBytes per member of the ring for 80-bit security). We propose a new code-based threshold ring signature scheme that achieves small signature size of 675N-228l bits, where N is the number of members in the ring and l is the number of signers, for a security level of 80 bits. We give a security proof of our scheme whose security relies - in both random oracle and ideal cipher models - on two coding theory problems, making our scheme the first provably secure code-based threshold ring signature scheme. Unfortunately, as often in code-based cryptography, the presented scheme leads to very large public keys.
引用
收藏
页码:222 / +
页数:4
相关论文
共 50 条
  • [21] A provably secure threshold signature scheme based on DDH assumption
    Lin, Xiaodong
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (06) : 678 - 684
  • [22] Code-Based Schemes for Post-Quantum Digital Signatures
    Kuznetsov, Alexandr
    Kiian, Anastasiia
    Pushkar'ov, Andriy
    Mialkovskyi, Danylo
    Smirnov, Oleksii
    Kuznetsova, Tetiana
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 707 - 712
  • [23] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [24] Subliminal Channels in the Code-based Ring Signature Scheme
    Wang, Bingsen
    Zhang, Zhuoran
    Zhang, Fangguo
    2019 14TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2019), 2019, : 146 - 150
  • [25] A New Code-Based Traceable Ring Signature Scheme
    Qi, Yanhong
    Wang, Li-Ping
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [26] Provably Secure Convertible Undeniable Signatures with Unambiguity
    Le Trieu Phong
    Kurosawa, Kaoru
    Ogata, Wakaha
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 291 - 308
  • [27] A Provably secure Certificate based ring signature without pairing
    Qin, Zhiguang
    Xiong, Hu
    Li, Fagen
    Xiong, H. (xionghu.uestc@gmail.com), 1600, Femto Technique Co., Ltd. (16): : 278 - 285
  • [28] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [29] Provably Secure Identity-Based Threshold Decryption on Access Structure
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 464 - 468
  • [30] Loong: a new IND-CCA-secure code-based KEM
    Wang, Li-Ping
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2584 - 2588