ID-based deniable ring authentication with constant-size signature

被引:11
|
作者
Wang L. [1 ]
Zhang G. [1 ]
Ma C. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University
来源
关键词
Bilinear pairings; Constant-size signature; Deniable ring authentication; ID-based; Privacy;
D O I
10.1007/s11704-008-0003-1
中图分类号
学科分类号
摘要
Deniable ring authentication allows a member of an ad-hoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot transfer the signature to any third party. It is an important cryptographic primitive for privacy and anonymous communication. Unfortunately, the size of the signature of the proposed deniable ring authentication is dependent on the size of the ring. It is inefficient especially when the size of the ring is large. In this paper, we propose an ID-based version of deniable ring authentication. We present a generic construction which uses dynamic accumulators to construct ID-based deniable ring authentication with constant-size signature. We also give an ID-based deniable ring authentication based on bilinear pairings, which is proved to be secure in the random oracle model. © 2008 Higher Education Press.
引用
收藏
页码:106 / 112
页数:6
相关论文
共 50 条
  • [1] A New ID-based deniable ring authentication with constant-size signature
    Hu, Chengyu
    Liu, Pengtao
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 1977 - +
  • [2] ID-Based Deniable Ring Signature with Constant-Size Signature
    Hu, Chengyu
    Liu, Pengtao
    ADVANCES IN CIVIL ENGINEERING, PTS 1-6, 2011, 255-260 : 2192 - +
  • [3] ID-based deniable ring signature with constant-size signature and its extention
    Hu, Chengyu
    Liu, Pengtao
    Journal of Computational Information Systems, 2010, 6 (11): : 3549 - 3558
  • [4] RETRACTED: ID-based Constant-Size Deniable Ring Authentication using a Secure Accumulator (Retracted Article)
    Hu, Chengyu
    Liu, Pengtao
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 354 - 357
  • [5] Improved ID-based ring signature scheme with constant-size signatures
    Li, Hongwei
    Li, Xiao
    He, Mingxing
    Zeng, Shengke
    Informatica (Ljubljana), 2011, 35 (03) : 343 - 350
  • [6] Improved ID-based Ring Signature Scheme with Constant-size Signatures
    Li, Hongwei
    Li, Xiao
    He, Mingxing
    Zeng, Shengke
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2011, 35 (03): : 343 - 350
  • [7] ID-based Deniable Threshold Ring Authentication
    Jin, Chunhua
    Xu, Chunxiang
    Jiang, Linzhi
    Li, Fagen
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1779 - 1784
  • [8] Constant-size ID-based linkable and Revocable-iff-Linked Ring Signature
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Yuen, Tsz Hon
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 364 - +
  • [9] Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Yuen, Tsz Hon
    THEORETICAL COMPUTER SCIENCE, 2013, 469 : 1 - 14
  • [10] Improvement of an ID-Based Deniable Authentication Protocol
    Tzu-Chun Lin
    JournalofElectronicScienceandTechnology, 2018, 16 (02) : 139 - 144