ID-based deniable ring authentication with constant-size signature

被引:11
|
作者
Wang L. [1 ]
Zhang G. [1 ]
Ma C. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University
来源
关键词
Bilinear pairings; Constant-size signature; Deniable ring authentication; ID-based; Privacy;
D O I
10.1007/s11704-008-0003-1
中图分类号
学科分类号
摘要
Deniable ring authentication allows a member of an ad-hoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot transfer the signature to any third party. It is an important cryptographic primitive for privacy and anonymous communication. Unfortunately, the size of the signature of the proposed deniable ring authentication is dependent on the size of the ring. It is inefficient especially when the size of the ring is large. In this paper, we propose an ID-based version of deniable ring authentication. We present a generic construction which uses dynamic accumulators to construct ID-based deniable ring authentication with constant-size signature. We also give an ID-based deniable ring authentication based on bilinear pairings, which is proved to be secure in the random oracle model. © 2008 Higher Education Press.
引用
收藏
页码:106 / 112
页数:6
相关论文
共 50 条
  • [31] ID-based ring signature and proxy ring signature schemes from bilinear pairings
    Department of Mathematics, Pranveer Singh Institute of Technology, Kalpi Road, Bhauti, Kanpur, India
    不详
    Int. J. Netw. Secur., 2007, 2 (187-192):
  • [32] An ID-based aggregate signature scheme with constant pairing computations
    Shim, Kyung-Ah
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (10) : 1873 - 1880
  • [33] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [34] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET
    Kumar, Vimal
    Kumar, Rakesh
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
  • [35] ID-based ring signature scheme for collaborative design system
    Wang, Xiao-Feng
    Zhang, Jing
    Wang, Shang-Ping
    Zhang, Ya-Ling
    Zhang, Xiang
    Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining and Technology, 2007, 36 (03): : 343 - 346
  • [36] Highly Efficient ID-based Ring Signature from Pairings
    Chien, Hung-Yu
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 829 - 834
  • [37] ID-based ring signature scheme secure in the standard model
    Au, Man Ho
    Liu, Joseph K.
    Yuen, Tsz Hon
    Wong, Duncan S.
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 1 - 16
  • [38] Strong designated Verifier ID-based Ring Signature Scheme
    Wu Lei
    Li Daxing
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 294 - +
  • [39] An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature
    Gao, Tianhan
    Qi, Jiayu
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 490 - 497
  • [40] ID-based group signature
    Park, S
    Kim, S
    Won, D
    ELECTRONICS LETTERS, 1997, 33 (19) : 1616 - 1617