[PDF] How to Leak a Secret: Theory and Applications of Ring Signatures | Semantic Scholar (2024)

Topics

Ring Signatures (opens in a new tab)Ring Signature Schemes (opens in a new tab)Group Signatures (opens in a new tab)Ring Members (opens in a new tab)Group Manager (opens in a new tab)Unconditional Anonymity (opens in a new tab)Threshold Ring Signature Scheme (opens in a new tab)Computational Anonymity (opens in a new tab)ID-based Ring Signature (opens in a new tab)Ring Equation (opens in a new tab)

1,418 Citations

Two-Party (Blind) Ring Signatures and Their Applications
    M. AuW. Susilo

    Computer Science, Mathematics

    ISPEC

  • 2014

This paper revisits the construction of ring signatures and proposes a scheme that is secure in the strongest sense and extends the construction to a two-party blind ring signature, which is safe in the standard model under well-known number-theoretic assumptions.

  • 2
Contributions to privacy preserving with ring signatures
    Yiqun Chen

    Computer Science

  • 2006

This thesis designs a protocol that enables a ring signer to receive an acknowledgement from the verifier and introduces the concept of identity-based anonymous designated ring signatures, which has not been studied before.

Universal Ring Signatures in the Standard Model
    P. BrancoNico DöttlingStella Wohnig

    Computer Science

    IACR Cryptol. ePrint Arch.

  • 2022

This work formalizes the concept of universal ring signatures (URS), and presents several constructions of URS, offering different tradeoffs between assumptions required, the level of security achieved, and the size of signatures.

  • 3
  • PDF
Traceable ring signatures: general framework and post-quantum security
    Hanwen FengJianwei LiuDawei LiYa-Nan LiQianhong Wu

    Computer Science

    Designs, Codes and Cryptography

  • 2021

This work proposes a general framework of TRS, using a non-interactive zero-knowledge proof of knowledge, a hash family, and a pseudorandom function with some additional properties, and gives two concrete efficient TRS schemes from lattices and symmetric-key primitives respectively, which are proven to be secure in the quantum random oracle model.

  • 15
A More Efficient Instantiation of Witness-Indistinguishable Signature
    Joseph K. LiuD. Wong

    Computer Science, Mathematics

    Int. J. Netw. Secur.

  • 2007

This paper points out that a ring signature scheme proposed by Abe, Ohkubo and Suzuki in ASIACRYPT’2002, is not signer anonymous, and proposes a different approach to fix the problem and shows that it does not degrade the performance of the original scheme and is easier to implement than their full-paper version.

Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption
    Benoît LibertThomas PetersChen Qian

    Computer Science, Mathematics

    ESORICS

  • 2018

This paper combines the Groth-Kohlweiss \(\varSigma \)-protocol (Eurocrypt’15) with dual-mode encryption schemes and proposes a fully tight construction based on the Decision Diffie-Hellman assumption in the random oracle model, with full tightness.

  • 23
  • PDF
Non-interactive deniable ring signature without random oracles
    Shengke ZengQinyi LiZhiguang QinQing Lu

    Computer Science

    Secur. Commun. Networks

  • 2016

This work proposes a new efficient non-interactive deniable ring signature scheme in the standard model that is a kind of ring signature and therefore, it does not require a setup algorithm, and the ring in the scheme is flexible.

  • 3
Group Signature with Deniability: How to Disavow a Signature
    Ai IshidaK. EmuraGoichiro HanaokaYusuke SakaiKeisuke Tanaka

    Computer Science

    CANS

  • 2016

This paper proposes the notion of deniable group signature, where the authority can issue a proof showing that the specified user is NOT the signer of the signature, without revealing the actual signer.

  • 11
  • PDF
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
    Adam BenderJonathan KatzRuggero Morselli

    Computer Science

    Journal of Cryptology

  • 2007

This paper proposes new definitions of anonymity and unforgeability which address these threats, and shows the first constructions of ring signature schemes in the standard model that satisfies the strongest definitions of security.

  • 400
  • Highly Influenced
  • PDF
Forcing out a confession: Threshold discernible ring signatures
    Swarun KumarShivank AgrawalR. VenkatesanSatyanarayana V. LokamC. Rangan

    Computer Science

    2010 International Conference on Security and…

  • 2010

In threshold discernible ring signatures, a group B of t members can co-operate to identify the original signer of a ring signature that involved a group A of n alleged signers, where B ⊂ A and n > t.

  • 2
  • Highly Influenced
  • PDF

...

...

68 References

Identity-Based Cryptosystems and Signature Schemes
    A. Shamir

    Computer Science

    CRYPTO

  • 1984

A novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.

  • 7,017
  • PDF
Ring Signature Schemes for General Ad-Hoc Access Structures
    Javier HerranzGermán Sáez

    Computer Science

    ESAS

  • 2004

The resulting scheme is anonymous and existentially unforgeable under chosen message attacks, assuming that the Discrete Logarithm problem is hard to solve.

  • 14
Deniable Ring Authentication Revisited
    W. SusiloY. Mu

    Computer Science

    ACNS

  • 2004

A generic construction that can convert any existing ring signature schemes to deniable ring authentication schemes and combines any ring signature scheme with an ID-based chameleon hash function is presented.

  • 29
  • PDF
Deniable Ring Authentication
    M. Naor

    Computer Science

    CRYPTO

  • 2002

This paper provides an efficient protocol for deniable ring authentication based on any strong encryption scheme, that is once an entity has published a public-key of such an encryption system, it can be drafted to any such ring, with no need for any other cryptographic primitive.

  • 184
  • PDF
Forking Lemmas in the Ring Signatures' Scenario
    Javier HerranzGermán Sáez

    Computer Science

    IACR Cryptol. ePrint Arch.

  • 2003

The generalized forking lemmas are used to prove that the proposed new ring signature scheme is existentially unforgeable under adaptive chosen-message attacks, in the random oracle model.

  • 12
  • PDF
Efficient Identity Based Ring Signature
    Sherman S. M. ChowS. YiuL. Hui

    Computer Science

    ACNS

  • 2005

This paper proposes a novel construction of ID-based ring signature which only needs two pairing computations for any group size, and is proven to be existential unforgeable against adaptive chosen message-and-identity attack under the random oracle model.

  • 176
  • PDF
Designated Verifier Proofs and Their Applications
    M. JakobssonKazue SakoR. Impagliazzo

    Computer Science

    EUROCRYPT

  • 1996

This work examplify the verifier designation method for the confirmation protocol for undeniable signatures, and demonstrates how a trap-door commitment scheme can be used to construct designated verifier proofs, both interactive and non-interactive.

  • 864
  • PDF
Ring Authenticated Encryption: A New Type of Authenticated Encryption
    Jiqiang LvK. RenXiaofeng ChenKwangjo Kim

    Computer Science

  • 2004

By combining the two notations of ring signature and authenticated encryption to- gether, we introduce a new type of authenticated encryption signature, called ring authenticated encryp- tion, which

  • 11
  • PDF
Non-interactive Deniable Ring Authentication
    W. SusiloY. Mu

    Computer Science

    ICISC

  • 2003

In this paper, it is possible to convince a verifier that a member of an ad hoc collection of participants is authenticating a message m without revealing which one and the verifier V cannot convince any third party that the message m was indeed authenticated in a non-interactive way.

  • 54
  • PDF
Accountable Ring Signatures: A Smart Card Approach
    Shouhuai XuM. Yung

    Computer Science

    CARDIS

  • 2004

An important advantage of ring signatures over group signatures is that there is no need to pre-specify rings or groups of users.

  • 43
  • PDF

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    [PDF] How to Leak a Secret: Theory and Applications of Ring Signatures | Semantic Scholar (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Dan Stracke

    Last Updated:

    Views: 6244

    Rating: 4.2 / 5 (43 voted)

    Reviews: 82% of readers found this page helpful

    Author information

    Name: Dan Stracke

    Birthday: 1992-08-25

    Address: 2253 Brown Springs, East Alla, OH 38634-0309

    Phone: +398735162064

    Job: Investor Government Associate

    Hobby: Shopping, LARPing, Scrapbooking, Surfing, Slacklining, Dance, Glassblowing

    Introduction: My name is Dan Stracke, I am a homely, gleaming, glamorous, inquisitive, homely, gorgeous, light person who loves writing and wants to share my knowledge and understanding with you.