ID-based deniable ring authentication with constant-size signature

被引:11
|
作者
Wang L. [1 ]
Zhang G. [1 ]
Ma C. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University
来源
关键词
Bilinear pairings; Constant-size signature; Deniable ring authentication; ID-based; Privacy;
D O I
10.1007/s11704-008-0003-1
中图分类号
学科分类号
摘要
Deniable ring authentication allows a member of an ad-hoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot transfer the signature to any third party. It is an important cryptographic primitive for privacy and anonymous communication. Unfortunately, the size of the signature of the proposed deniable ring authentication is dependent on the size of the ring. It is inefficient especially when the size of the ring is large. In this paper, we propose an ID-based version of deniable ring authentication. We present a generic construction which uses dynamic accumulators to construct ID-based deniable ring authentication with constant-size signature. We also give an ID-based deniable ring authentication based on bilinear pairings, which is proved to be secure in the random oracle model. © 2008 Higher Education Press.
引用
收藏
页码:106 / 112
页数:6
相关论文
共 50 条
  • [41] ID-based group signature
    Electronics and Telecommunications, Research Inst, Taejon, Korea, Republic of
    Electron Lett, 19 (1616-1617):
  • [42] Revocable ID-Based Signature with Short Size over Lattices
    Hung, Ying-Hao
    Tseng, Yuh-Min
    Huang, Sen-Shan
    SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 9
  • [43] ID-Based Ring Signature against Continual Side Channel Attack
    Yu, Qihong
    Li, Jiguo
    Shen, Jian
    SYMMETRY-BASEL, 2023, 15 (01):
  • [44] On the Security of a Constant-Size Group Signature Scheme
    Zhang, Jianhong
    Zou, Jiancheng
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 212 - 215
  • [45] ID-based Signature Under the Schnorr Signature
    He, Zhonghua
    Ge, Lina
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4672 - 4674
  • [46] An ID-based Block Ring Signature System for Secret Sharing of Data
    Patil, Kavita
    Wasnik, Chitra T.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [47] Strong Designated Verifier ID-based Threshold Ring Signature Scheme
    Wu, Lei
    Hu, Defa
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 41 (11): : 222 - 229
  • [48] Strong designated verifier ID-based threshold ring signature scheme
    Wu, Lei
    Hu, Defa
    International Journal of Applied Mathematics and Statistics, 2013, 41 (11): : 222 - 229
  • [49] Authentication Protocols and Authentication on the Base of PKI and ID-based
    Min Thant
    Zaw, Than Myo
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [50] Efficient ID-based threshold signature
    Liu, Ying
    Hu, Yu-Pu
    Wang, Fei
    Lu, Xiao-Jun
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2006, 33 (02): : 311 - 315