ID-based deniable ring authentication with constant-size signature

被引:11
|
作者
Wang L. [1 ]
Zhang G. [1 ]
Ma C. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University
来源
关键词
Bilinear pairings; Constant-size signature; Deniable ring authentication; ID-based; Privacy;
D O I
10.1007/s11704-008-0003-1
中图分类号
学科分类号
摘要
Deniable ring authentication allows a member of an ad-hoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot transfer the signature to any third party. It is an important cryptographic primitive for privacy and anonymous communication. Unfortunately, the size of the signature of the proposed deniable ring authentication is dependent on the size of the ring. It is inefficient especially when the size of the ring is large. In this paper, we propose an ID-based version of deniable ring authentication. We present a generic construction which uses dynamic accumulators to construct ID-based deniable ring authentication with constant-size signature. We also give an ID-based deniable ring authentication based on bilinear pairings, which is proved to be secure in the random oracle model. © 2008 Higher Education Press.
引用
收藏
页码:106 / 112
页数:6
相关论文
共 50 条
  • [12] Efficient ID-based deniable authentication protocols
    Shi, Yijuan
    Li, Jianhua
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 321 - 324
  • [13] Improvement of an ID-based deniable authentication protocol
    Lin T.-C.
    Lin, Tzu-Chun (lintc@fcu.edu.tw), 2018, Univ. of Electronic Science and Technology of China (16): : 139 - 144
  • [14] A new ID-based deniable authentication protocol
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Shengbao
    Bao, Haiyong
    INFORMATICA, 2007, 18 (01) : 67 - 78
  • [15] An enhanced ID-based deniable authentication protocol on pairings
    Lim, Meng-Hui
    Lee, Sanggon
    Park, Youngho
    Lee, Hoonjae
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1008 - 1017
  • [16] Practical Constant-Size Ring Signature
    Qin, Meng-Jun
    Zhao, Yun-Lei
    Ma, Zhou-Jun
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (03) : 533 - 541
  • [17] Practical Constant-Size Ring Signature
    Meng-Jun Qin
    Yun-Lei Zhao
    Zhou-Jun Ma
    Journal of Computer Science and Technology, 2018, 33 : 533 - 541
  • [18] Identity-based ring signature scheme with constant-size signature
    Wang, Ling-Ling
    Zhang, Guo-Yin
    Ma, Chun-Guang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (11): : 2645 - 2648
  • [19] An efficient ID-based deniable authentication protocol from pairings
    Cao, TJ
    Lin, DD
    Xue, R
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 388 - 391
  • [20] ID-based non-interactive deniable authentication protocol
    Shi Wei-min
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482