An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

被引:4
|
作者
Zhou, Guomin [1 ]
Zeng, Peng [2 ]
Yuan, Xiaohui [3 ,4 ]
Chen, Siyuan [2 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] Zhejiang Police Coll, Dept Comp & Informat Technol, Hangzhou, Zhejiang, Peoples R China
[2] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
[3] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[4] China Univ Geosci, Coll Informat Engn, Wuhan, Hubei, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2017/1915239
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring). While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participantmodel enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process) upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.'s (2001) scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model (vol 2017, 1915239, 2017)
    Zhou, Guomin
    Zeng, Peng
    Yuan, Xiaohui
    Chen, Siyuan
    Choo, Kim-Kwang Raymond
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [2] An efficient code-based threshold ring signature scheme
    Assidi, Hafsa
    Ayebie, Edoukou Berenger
    Souidi, El Mamoun
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 52 - 60
  • [3] A New Code-Based Linkable Threshold Ring Signature Scheme
    Ren, Fang
    Xiu, Haiyan
    Ji, Chuxin
    Zheng, Dong
    Wu, Ziyi
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [4] An Efficient Attack on a Code-Based Signature Scheme
    Phesso, Aurelie
    Tillich, Jean-Pierre
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 86 - 103
  • [5] A Secure and Efficient Code-Based Signature Scheme
    Liu, Xiangxin
    Yang, Xiaoyuan
    Han, Yiliang
    Wang, Xu An
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 635 - 645
  • [6] Subliminal Channels in the Code-based Ring Signature Scheme
    Wang, Bingsen
    Zhang, Zhuoran
    Zhang, Fangguo
    [J]. 2019 14TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2019), 2019, : 146 - 150
  • [7] A New Code-Based Traceable Ring Signature Scheme
    Qi, Yanhong
    Wang, Li-Ping
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] Efficient code-based fully dynamic group signature scheme
    Wang, Luping
    Chen, Jie
    Dai, Huan
    Tao, Chongben
    [J]. THEORETICAL COMPUTER SCIENCE, 2024, 990
  • [9] A code-based group signature scheme
    Quentin Alamélou
    Olivier Blazy
    Stéphane Cauchie
    Philippe Gaborit
    [J]. Designs, Codes and Cryptography, 2017, 82 : 469 - 493
  • [10] A code-based group signature scheme
    Alamelou, Quentin
    Blazy, Olivier
    Cauchie, Stephane
    Gaborit, Philippe
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2017, 82 (1-2) : 469 - 493