ID-based deniable ring authentication with constant-size signature

被引:11
|
作者
Wang L. [1 ]
Zhang G. [1 ]
Ma C. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University
来源
关键词
Bilinear pairings; Constant-size signature; Deniable ring authentication; ID-based; Privacy;
D O I
10.1007/s11704-008-0003-1
中图分类号
学科分类号
摘要
Deniable ring authentication allows a member of an ad-hoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot transfer the signature to any third party. It is an important cryptographic primitive for privacy and anonymous communication. Unfortunately, the size of the signature of the proposed deniable ring authentication is dependent on the size of the ring. It is inefficient especially when the size of the ring is large. In this paper, we propose an ID-based version of deniable ring authentication. We present a generic construction which uses dynamic accumulators to construct ID-based deniable ring authentication with constant-size signature. We also give an ID-based deniable ring authentication based on bilinear pairings, which is proved to be secure in the random oracle model. © 2008 Higher Education Press.
引用
收藏
页码:106 / 112
页数:6
相关论文
共 50 条
  • [21] Attribute-based ring signature scheme with constant-size signature
    Wenqiang, W.
    Shaozhen, C.
    IET INFORMATION SECURITY, 2010, 4 (02) : 104 - 110
  • [22] An Enhanced Constant-Size Identity-Based Ring Signature Scheme
    Hu, Chengyu
    Liu, Pengtao
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 587 - +
  • [23] On the security of a practical constant-size ring signature scheme
    Zhang, Jianhong
    Bai, Wenle
    Jiang, Zhengtao
    International Journal of Network Security, 2020, 22 (03) : 394 - 398
  • [24] Cryptanalysis and improvement of a constant-size identity based ring signature scheme
    Wang, Huaqun
    Guo, Xianjiu
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 803 - +
  • [25] ID-based Non-interactive Deniable Authentication Protocol from Pairings
    Xin Xiangjun
    Chen Dongsheng
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080
  • [26] ID-based, blind signature and ring signature from pairings
    Zhang, FG
    Kim, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 533 - 547
  • [27] Constant-size ring signature scheme using multilinear maps
    Zhang, Xiangsong
    Liu, Zhenhua
    Wang, Xu An
    Wang, Fenghe
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (02) : 206 - 215
  • [28] Efficient ID-Based Ring Signature and Ring Signcryption Schemes
    Zhu, Lijun
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
  • [29] Efficient ID-based Threshold Ring Signature scheme
    Jiang Han
    Xu QiuLiang
    Chen Guohua
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
  • [30] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +