Collusion-resistant convertible ring signature schemes
详细信息    查看全文
  • 作者:Jung Yeon Hwang (1)
    Ku-Young Chang (1)
    Hyun Sook Cho (1)
    Boyeon Song (2)
    Willy Susilo (3)

    1. Electronics and Telecommunications Research Institute (ETRI)
    ; Daejeon ; Korea
    2. Korea Institute of Science and Technology Information (KISTI)
    ; Daejeon ; Korea
    3. Centre for Computer and Information Security Research
    ; School of Computer Science and Software Engineering ; University of Wollongong ; Wollongong ; Australia
  • 关键词:authentication ; ring signature ; anonymity ; convertibility ; collusion ; resistance ; 012108
  • 刊名:SCIENCE CHINA Information Sciences
  • 出版年:2015
  • 出版时间:January 2015
  • 年:2015
  • 卷:58
  • 期:1
  • 页码:1-16
  • 全文大小:333 KB
  • 参考文献:1. Bender A, Katz J, Morselli R. Ring signatures: stronger definitions, and constructions without random oracles. J Crypt, 2009, 22: 114鈥?38 CrossRef
    2. Rivest R, Shamir A, Tauman Y. How to leak a secret. Lect Notes Comput Sci, 2001, 2248: 552鈥?65 CrossRef
    3. Lv J, Wang X. Verifiable ring signature. In: Proceedings of CANS鈥?3, Miami, 2003. 663鈥?65
    4. Lee K C, Wen H-A, Hwang T. Convertible ring signature. IEE Proc Commun, 2005, 152: 411鈥?14 CrossRef
    5. Rivest R, Shamir A, Tauman Y. How to leak a secret: theory and applications of ring signatures. Lect Notes Comput Sci, 2010, 3895: 552鈥?65
    6. Hwang J Y. A note on an identity-based ring signature scheme with signer verifiability. Theorl Comput Sci, 2011, 412: 796鈥?04 CrossRef
    7. Wang H, Zhang F, Sun Y. Cryptanalysis of a generalized ring signature scheme. IEEE Trans Dependable Secur Comput, 2009, 6: 149鈥?51 CrossRef
    8. Jeong I R, Kwon J O, Lee D H. Ring signature with weak linkability and its applications. IEEE Trans Knowl Data Eng, 2008, 20: 1145鈥?148 CrossRef
    9. Schnorr C P. Efficient signature generation by smart cards. J Crypt, 1991, 4: 161鈥?74 CrossRef
    10. Cramer R, Damg氓rd I, Schoenmakers B. Proofs of partial knowledge and simplified design of witness hiding protocols. Lect Notes Comput Sci, 1994, 839: 174鈥?87 CrossRef
    11. Abe M, Ohkubo M, Suzuki K. 1-out-of-n Signatures from a Variety of Keys. Lect Notes Comput Sci, 2002, 2501: 415鈥?32 CrossRef
    12. Herranz J, S谩ez G. Forking lemmas for ring signatures schemes. Lect Notes Comput Sci, 2003, 2904: 266鈥?79 CrossRef
    13. Liu J K, Wong D S. On the security models of (threshold) ring signature schemes. Lect Notes Comput Sci, 2004, 3506: 204鈥?17 CrossRef
    14. Chandran N, Groth J, Sahai A. Ring signatures of sub-linear size without random oracles. Lect Notes Comput Sci, 2007, 4596: 423鈥?34 CrossRef
    15. Ohkubo M, Abe M. On the definitions of anonymity for ring signatures. IEICE Trans Fund Electron Commun Comput Sci, 2008, E91-A: 272鈥?82 CrossRef
    16. Sch盲ge S, Schwenk J. A CDH-based ring signature scheme with short signatures and public keys. Lect Notes Comput Sci, 2010, 6052: 129鈥?42 CrossRef
    17. Ki J, Hwang J Y, Nyang D, et al. Constructing strong identity-based designated verifier signatures with self-unverifiability. ETRI J, 2012, 34: 235鈥?44 CrossRef
    18. Au M H, Liu J K, Susilo W. Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE. IEEE Trans Inf Forensics Secur, 2013, 8: 1909鈥?922 CrossRef
    19. Au M H, Liu J K, Susilo W, et al. Constant-size ID-based linkable and revocable-iff-linked ring signature. Lect Notes Comput Sci, 2006, 4329: 364鈥?78 CrossRef
    20. Chow S S M, Yiu S-M, Hui L C K. Efficient identity based ring signature. Lect Notes Comput Sci, 2005, 3531: 499鈥?12 CrossRef
    21. Herranz J. Identity-based ring signatures from RSA. Theor Comput Sci, 2007, 389: 100鈥?17 CrossRef
    22. Zhang F, Kim K. ID-based blind signature and ring signature from pairings. Lect Notes Comput Sci, 2002, 2501: 533鈥?47 CrossRef
    23. Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to Ad-hoc groups. Lect Notes Comput Sci, 2002, 2442: 465鈥?80 CrossRef
    24. Yuen T H, Liu J K, Au M H, et al. Threshold ring signature without random oracles. In: Proceedings of ASIACCS鈥?1, New York, 2011. 261鈥?67
    25. Xu S, Yung M. Accountable ring signatures: a smart card approach. In: Proceedings of Smart Card Research and Advanced Applications VI. Berlin: Springer-Verlag, 2006. 271鈥?81
    26. Fujisaki E, Suzuki K, Tauman Y. Traceable ring signature. Lect Notes Comput Sci, 2007, 4450: 181鈥?00 CrossRef
    27. Boyen X. Mesh signatures: how to leak a secret with unwitting and unwilling participants. Lect Notes Comput Sci, 2001, 4515: 210鈥?17 CrossRef
    28. Xiong H, Qin Z, Li F. A taxonomy of ring signature schemes: theory and applications. IETE J Res, 2013, 59: 376鈥?82 CrossRef
    29. Wang L, Zhang G, Ma C. A survey of ring signature. Front Elect Electron Eng China, 2009, 3: 10鈥?9 CrossRef
    30. Ren J, Harn L. Ring signature based on ElGamal signature. Lect Notes Comput Sci, 2006, 4136: 445鈥?56 CrossRef
    31. Zhang C L, Liu Y, He D Q. A new verifiable ring signature scheme based on Nyberg-Rueppel scheme. In: Proceedings of ICSP鈥?6, Beijing, 2006
    32. Wang C, Lin C. Efficient signature generation by smart cards. Inf Sci, 2007, 177: 747鈥?54 CrossRef
    33. Camenisch J, Stadler M. Efficient group signature scheme for large groups. Lect Notes Comput Sci, 1997, 1294: 410鈥?24 CrossRef
    34. Asokan N, Niemi V, Laitinen P. On the usefulness of proof-of-possession. In: Proceedings of the 2nd Annual PKI Research Workshop, Maryland, 2003. 122鈥?27
    35. Meneze A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1997. 87鈥?02
  • 刊物类别:Computer Science
  • 刊物主题:Chinese Library of Science
    Information Systems and Communication Service
  • 出版者:Science China Press, co-published with Springer
  • ISSN:1869-1919
文摘
A ring signature scheme provides signer ambiguity by hiding a signer in a ring of arbitrary members appropriately. A convertible ring signature scheme is an extension of a ring signature scheme that authenticates a signer and proves that a real signer and no one else generated a ring signature. In this paper, we first show that the recent convertible ring signature scheme proposed by Jeong et al. is vulnerable to collusion attacks. Second, we present a formal security model for a convertible ring signature with collusion resistance. The security notion of a convertible ring signature is intrinsically different from that of an ordinary ring signature due to the conversion property. For our collusion resistance, we consider full key exposure, that is, even an adversary who knows all secret keys will not be able to break the collusion resistance. Finally, we construct a novel convertible ring signature scheme with collusion resistance and prove the security of the scheme in the presented security model. We also compare our scheme with the existing ring signature schemes in the literature to show its advantages.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700