ID-based ring signature scheme secure in the standard model

Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

70 Citations (Scopus)


The only known construction of ID-based ring signature schemes which maybe secure in the standard model is to attach certificates to non-ID-based ring signatures. This method leads to schemes that are somewhat inefficient and it is an open problem to find more efficient and direct constructions. In this paper, we propose two such constructions. Our first scheme, with signature size linear in the cardinality of the ring, is secure in the standard model under the computational Diffie-Hellman assumption. The second scheme, achieving constant signature size, is secure in a weaker attack model (the selective ID and selective chosen message model), under the Diffie-Hellman Inversion assumption.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings
Number of pages16
ISBN (Print)3540476997, 9783540476993
Publication statusPublished - 1 Jan 2006
Externally publishedYes
Event1st International Workshop on Security, IWSEC 2006 - Kyoto, Japan
Duration: 23 Oct 200624 Oct 2006

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference1st International Workshop on Security, IWSEC 2006

Cite this