Identity-based ring signature scheme based on quadratic residues

被引:0
|
作者
Xiong, Hu [1 ]
Qin, Zhiguang [1 ]
Li, Fagen [1 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
关键词
Electronic document identification systems - Network security - Public key cryptography;
D O I
10.3772/j.issn.1006-6748.2009.01.017
中图分类号
学科分类号
摘要
Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are constructed from bilinear pairings, a powerful but computationally expensive primitive. Hence, ID-based ring signature without pairing is of great interest in the field of cryptography. In this paper, the authors firstly propose an ID-based ring signature scheme based on quadratic residues. The proposed scheme is proved to be existentially unforgeable against adaptive chosen message-and-identity attack under the random oracle model, assuming the hardness of factoring. The proposed scheme is more efficient than those which are constructed from bilinear pairings. Copyright © by High Technology Letters Press.
引用
收藏
页码:94 / 100
相关论文
共 50 条
  • [2] Identity-based signature scheme based on quadratic residues
    Chai ZhenChuan
    Cao ZhenFu
    Dong XiaoLei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 373 - 380
  • [3] Identity-based signature scheme based on quadratic residues
    ZhenChuan Chai
    ZhenFu Cao
    XiaoLei Dong
    Science in China Series F: Information Sciences, 2007, 50 : 373 - 380
  • [4] Identity-based signature scheme based on quadratic residues
    CHAI ZhenChuan
    Science in China(Series F:Information Sciences), 2007, (03) : 373 - 380
  • [5] Identity-based Ring Signature Scheme Based on Cubic Residues
    Dong, Xuedong
    Liu, Xinxin
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 897 - 900
  • [6] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [7] Identity-based signature scheme based on quintic residues
    Dong, Xue-Dong
    Gao, Yuan
    PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016), 2016, 117 : 836 - 841
  • [8] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [9] A Modified Identity-based Signature Scheme Based on Cubic Residues
    Dong, Xuedong
    Liu, Xinxin
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1039 - 1043
  • [10] Identity oriented signature scheme based on quadratic residues
    Qiu, WD
    Chen, KF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 235 - 242