A New Identity-Based Threshold Ring Signature Scheme

被引:0
|
作者
Xu, Feng [1 ]
Lv, Xin [1 ]
机构
[1] Hohai Univ, HHU, Coll Comp & Informat, Nanjing, Peoples R China
关键词
ring signature; discrete logarithm problem; bilinear pairings; secret sharing; unforgeability;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Aiming at the security problems existed in most identity-based threshold ring signature (ITRS) schemes, including poor security and inefficient in verifying, a new ITRS scheme is proposed. We significantly enhance the security of signature key by using bilinear pairings and secret sharing techniques. Our analysis indicates that the proposed scheme achieves unconditional anonymity and unforgeability. A security problem (ring member-changing attack) also can be solved. Compared to the congener schemes, ours is much more efficient in signing process.
引用
收藏
页码:2646 / 2651
页数:6
相关论文
共 50 条
  • [1] An identity-based threshold ring signature scheme based on the bilinear pairings
    Shang, Jiu-qing
    Xu, Qiu-liang
    Liu, Xin
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
  • [2] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [3] Two new identity-based threshold ring signature schemes
    Deng, Lunzhi
    Zeng, Jiwen
    THEORETICAL COMPUTER SCIENCE, 2014, 535 : 38 - 45
  • [4] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [5] Identity-based Threshold Ring Signature Without Pairings
    Xiong Hu
    Qin ZhiGuang
    Li Fagen
    Jin Jing
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 537 - 541
  • [6] Subliminal channels in the identity-based threshold ring signature
    Yang, Chao-Lin
    Li, Chuan-Ming
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2009, 86 (05) : 753 - 770
  • [7] Efficiency identity-based threshold group signature scheme
    School of Electronic Engineering, Xidian Univ., Xi'an 710071, China
    不详
    Tongxin Xuebao, 2009, 5 (122-127):
  • [8] Identity-based traceable ring signature scheme on lattice
    Ye Q.
    Chen Q.
    Dou Y.
    Zhang J.
    Tang Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 161 - 168
  • [9] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 181 - 192
  • [10] An identity-based ring signature scheme with enhanced privacy
    Gamage, Chandana
    Gras, Ben
    Crispo, Bruno
    Tanenbaum, Andrew S.
    2006 SECURECOMM AND WORKSHOPS, 2006, : 257 - +