An Efficient Attribute-Based Ring Signature Scheme

被引:3
|
作者
Wang Wenqiang [1 ]
Chen Shaozhen [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Peoples R China
关键词
ring signature; attribute-based; anonymity; computational Diffie-Hellman assumption;
D O I
10.1109/IFCSTA.2009.43
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An efficient attribute-based ring signature scheme is proposed in this paper. The signer signs message by using subset of its attributes. Let all the users with this attributes subset be a ring. It requires that anyone can not tell who generates the signature in this ring. Furthermore, anyone could not forge the signature for this ring if it not in this ring. It is proved to be unforgeable in the random oracle model and is unconditional anonymous. This new scheme is more efficient and flexible than the previous identify-based ring signature schemes. Compared with the existing attribute-based ring signature schemes, the length of the signature decreases by 1/3, and the pairing operations in our schemes also decrease by 1/3. Thus the efficiency of signing and verifying improves greatly.
引用
下载
收藏
页码:147 / 150
页数:4
相关论文
共 50 条
  • [21] Comments on “verifiable outsourced attribute-based signature scheme”
    Osmanbey Uzunkol
    Multimedia Tools and Applications, 2019, 78 : 11735 - 11742
  • [22] Comments on "verifiable outsourced attribute-based signature scheme"
    Uzunkol, Osmanbey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 11735 - 11742
  • [23] An Attribute-Based Signature Scheme from Lattice Assumption
    ZHANG Yanhua
    HU Yupu
    JIANG Mingming
    Wuhan University Journal of Natural Sciences, 2015, 20 (03) : 207 - 213
  • [24] Attribute-based signature with AT
    Ma, Chun-Guang
    Shi, Lan
    Wang, Ding
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2013, 42 (03): : 410 - 414
  • [25] Attribute-based signature scheme with constant size signature in the standard model
    Ge, A-J
    Ma, C-G
    Zhang, Z-F
    IET INFORMATION SECURITY, 2012, 6 (02) : 47 - 54
  • [26] Efficient revocable attribute-based encryption scheme
    Li X.
    Zhang D.
    Li H.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [27] Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography
    Ma, Rui
    Du, Linyue
    PLOS ONE, 2024, 19 (05):
  • [28] Efficient and secure attribute-based signature for monotone predicates
    Gu, Ke
    Jia, Weijia
    Wang, Guojun
    Wen, Sheng
    ACTA INFORMATICA, 2017, 54 (05) : 521 - 541
  • [29] Efficient and secure attribute-based signature for monotone predicates
    Ke Gu
    Weijia Jia
    Guojun Wang
    Sheng Wen
    Acta Informatica, 2017, 54 : 521 - 541
  • [30] Attribute-based strong designated-verifier signature scheme
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Wei-Kuei
    Sun, Wei-Zhe
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) : 944 - 959