Topics
Ring Signatures (opens in a new tab)Ring Signature Schemes (opens in a new tab)Group Signatures (opens in a new tab)Ring Members (opens in a new tab)Group Manager (opens in a new tab)Unconditional Anonymity (opens in a new tab)Threshold Ring Signature Scheme (opens in a new tab)Computational Anonymity (opens in a new tab)ID-based Ring Signature (opens in a new tab)Ring Equation (opens in a new tab)
1,418 Citations
- M. AuW. Susilo
- 2014
Computer Science, Mathematics
ISPEC
This paper revisits the construction of ring signatures and proposes a scheme that is secure in the strongest sense and extends the construction to a two-party blind ring signature, which is safe in the standard model under well-known number-theoretic assumptions.
- 2
- Yiqun Chen
- 2006
Computer Science
This thesis designs a protocol that enables a ring signer to receive an acknowledgement from the verifier and introduces the concept of identity-based anonymous designated ring signatures, which has not been studied before.
- P. BrancoNico DöttlingStella Wohnig
- 2022
Computer Science
IACR Cryptol. ePrint Arch.
This work formalizes the concept of universal ring signatures (URS), and presents several constructions of URS, offering different tradeoffs between assumptions required, the level of security achieved, and the size of signatures.
- 3
- PDF
- Hanwen FengJianwei LiuDawei LiYa-Nan LiQianhong Wu
- 2021
Computer Science
Designs, Codes and Cryptography
This work proposes a general framework of TRS, using a non-interactive zero-knowledge proof of knowledge, a hash family, and a pseudorandom function with some additional properties, and gives two concrete efficient TRS schemes from lattices and symmetric-key primitives respectively, which are proven to be secure in the quantum random oracle model.
- 15
- Joseph K. LiuD. Wong
- 2007
Computer Science, Mathematics
Int. J. Netw. Secur.
This paper points out that a ring signature scheme proposed by Abe, Ohkubo and Suzuki in ASIACRYPT’2002, is not signer anonymous, and proposes a different approach to fix the problem and shows that it does not degrade the performance of the original scheme and is easier to implement than their full-paper version.
- 5
- Highly Influenced
- PDFSee AlsoHow to Leak a Secret | Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in CryptologyLibro News of the day Adventures of a Wildly Cantankerous Veteran Newsroom Saving Dying Newspapers (en Ing De Kelton, Peter - Buscalibre
- Benoît LibertThomas PetersChen Qian
- 2018
Computer Science, Mathematics
ESORICS
This paper combines the Groth-Kohlweiss \(\varSigma \)-protocol (Eurocrypt’15) with dual-mode encryption schemes and proposes a fully tight construction based on the Decision Diffie-Hellman assumption in the random oracle model, with full tightness.
- 23
- PDF
- Shengke ZengQinyi LiZhiguang QinQing Lu
- 2016
Computer Science
Secur. Commun. Networks
This work proposes a new efficient non-interactive deniable ring signature scheme in the standard model that is a kind of ring signature and therefore, it does not require a setup algorithm, and the ring in the scheme is flexible.
- 3
- Ai IshidaK. EmuraGoichiro HanaokaYusuke SakaiKeisuke Tanaka
- 2016
Computer Science
CANS
This paper proposes the notion of deniable group signature, where the authority can issue a proof showing that the specified user is NOT the signer of the signature, without revealing the actual signer.
- 11
- PDF
- Adam BenderJonathan KatzRuggero Morselli
- 2007
Computer Science
Journal of Cryptology
This paper proposes new definitions of anonymity and unforgeability which address these threats, and shows the first constructions of ring signature schemes in the standard model that satisfies the strongest definitions of security.
- 400
- Highly Influenced
- PDF
- Swarun KumarShivank AgrawalR. VenkatesanSatyanarayana V. LokamC. Rangan
- 2010
Computer Science
2010 International Conference on Security and…
In threshold discernible ring signatures, a group B of t members can co-operate to identify the original signer of a ring signature that involved a group A of n alleged signers, where B ⊂ A and n > t.
- 2
- Highly Influenced
- PDF
...
...
68 References
- A. Shamir
- 1984
Computer Science
CRYPTO
A novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
- 7,017
- PDF
- Javier HerranzGermán Sáez
- 2004
Computer Science
ESAS
The resulting scheme is anonymous and existentially unforgeable under chosen message attacks, assuming that the Discrete Logarithm problem is hard to solve.
- 14
- W. SusiloY. Mu
- 2004
Computer Science
ACNS
A generic construction that can convert any existing ring signature schemes to deniable ring authentication schemes and combines any ring signature scheme with an ID-based chameleon hash function is presented.
- 29
- PDF
- M. Naor
- 2002
Computer Science
CRYPTO
This paper provides an efficient protocol for deniable ring authentication based on any strong encryption scheme, that is once an entity has published a public-key of such an encryption system, it can be drafted to any such ring, with no need for any other cryptographic primitive.
- 184
- PDF
- Javier HerranzGermán Sáez
- 2003
Computer Science
IACR Cryptol. ePrint Arch.
The generalized forking lemmas are used to prove that the proposed new ring signature scheme is existentially unforgeable under adaptive chosen-message attacks, in the random oracle model.
- 12
- PDF
- Sherman S. M. ChowS. YiuL. Hui
- 2005
Computer Science
ACNS
This paper proposes a novel construction of ID-based ring signature which only needs two pairing computations for any group size, and is proven to be existential unforgeable against adaptive chosen message-and-identity attack under the random oracle model.
- 176
- PDF
- M. JakobssonKazue SakoR. Impagliazzo
- 1996
Computer Science
EUROCRYPT
This work examplify the verifier designation method for the confirmation protocol for undeniable signatures, and demonstrates how a trap-door commitment scheme can be used to construct designated verifier proofs, both interactive and non-interactive.
- 864
- PDF
- Jiqiang LvK. RenXiaofeng ChenKwangjo Kim
- 2004
Computer Science
By combining the two notations of ring signature and authenticated encryption to- gether, we introduce a new type of authenticated encryption signature, called ring authenticated encryp- tion, which…
- 11
- PDF
- W. SusiloY. Mu
- 2003
Computer Science
ICISC
In this paper, it is possible to convince a verifier that a member of an ad hoc collection of participants is authenticating a message m without revealing which one and the verifier V cannot convince any third party that the message m was indeed authenticated in a non-interactive way.
- 54
- PDF
- Shouhuai XuM. Yung
- 2004
Computer Science
CARDIS
An important advantage of ring signatures over group signatures is that there is no need to pre-specify rings or groups of users.
- 43
- PDF
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers