ID-based ring signature scheme secure in the standard model

Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

56 Citations (Scopus)

Abstract

The only known construction of ID-based ring signature schemes which maybe secure in the standard model is to attach certificates to non-ID-based ring signatures. This method leads to schemes that are somewhat inefficient and it is an open problem to find more efficient and direct constructions. In this paper, we propose two such constructions. Our first scheme, with signature size linear in the cardinality of the ring, is secure in the standard model under the computational Diffie-Hellman assumption. The second scheme, achieving constant signature size, is secure in a weaker attack model (the selective ID and selective chosen message model), under the Diffie-Hellman Inversion assumption.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings
PublisherSpringer
Pages1-16
Number of pages16
ISBN (Print)3540476997, 9783540476993
Publication statusPublished - 1 Jan 2006
Externally publishedYes
Event1st International Workshop on Security, IWSEC 2006 - Kyoto, Japan
Duration: 23 Oct 200624 Oct 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4266 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Workshop on Security, IWSEC 2006
CountryJapan
CityKyoto
Period23/10/0624/10/06

Cite this

Au, M. H., Liu, J. K., Yuen, T. H., & Wong, D. S. (2006). ID-based ring signature scheme secure in the standard model. In Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings (pp. 1-16). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4266 LNCS). Springer.
Au, Man Ho ; Liu, Joseph K. ; Yuen, Tsz Hon ; Wong, Duncan S. / ID-based ring signature scheme secure in the standard model. Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, 2006. pp. 1-16 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{f84694b7826d4ab6ba9f5af94228d0ff,
title = "ID-based ring signature scheme secure in the standard model",
abstract = "The only known construction of ID-based ring signature schemes which maybe secure in the standard model is to attach certificates to non-ID-based ring signatures. This method leads to schemes that are somewhat inefficient and it is an open problem to find more efficient and direct constructions. In this paper, we propose two such constructions. Our first scheme, with signature size linear in the cardinality of the ring, is secure in the standard model under the computational Diffie-Hellman assumption. The second scheme, achieving constant signature size, is secure in a weaker attack model (the selective ID and selective chosen message model), under the Diffie-Hellman Inversion assumption.",
author = "Au, {Man Ho} and Liu, {Joseph K.} and Yuen, {Tsz Hon} and Wong, {Duncan S.}",
year = "2006",
month = "1",
day = "1",
language = "English",
isbn = "3540476997",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "1--16",
booktitle = "Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings",

}

Au, MH, Liu, JK, Yuen, TH & Wong, DS 2006, ID-based ring signature scheme secure in the standard model. in Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4266 LNCS, Springer, pp. 1-16, 1st International Workshop on Security, IWSEC 2006, Kyoto, Japan, 23/10/06.

ID-based ring signature scheme secure in the standard model. / Au, Man Ho; Liu, Joseph K.; Yuen, Tsz Hon; Wong, Duncan S.

Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, 2006. p. 1-16 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - ID-based ring signature scheme secure in the standard model

AU - Au, Man Ho

AU - Liu, Joseph K.

AU - Yuen, Tsz Hon

AU - Wong, Duncan S.

PY - 2006/1/1

Y1 - 2006/1/1

N2 - The only known construction of ID-based ring signature schemes which maybe secure in the standard model is to attach certificates to non-ID-based ring signatures. This method leads to schemes that are somewhat inefficient and it is an open problem to find more efficient and direct constructions. In this paper, we propose two such constructions. Our first scheme, with signature size linear in the cardinality of the ring, is secure in the standard model under the computational Diffie-Hellman assumption. The second scheme, achieving constant signature size, is secure in a weaker attack model (the selective ID and selective chosen message model), under the Diffie-Hellman Inversion assumption.

AB - The only known construction of ID-based ring signature schemes which maybe secure in the standard model is to attach certificates to non-ID-based ring signatures. This method leads to schemes that are somewhat inefficient and it is an open problem to find more efficient and direct constructions. In this paper, we propose two such constructions. Our first scheme, with signature size linear in the cardinality of the ring, is secure in the standard model under the computational Diffie-Hellman assumption. The second scheme, achieving constant signature size, is secure in a weaker attack model (the selective ID and selective chosen message model), under the Diffie-Hellman Inversion assumption.

UR - http://www.scopus.com/inward/record.url?scp=33845272549&partnerID=8YFLogxK

M3 - Conference Paper

SN - 3540476997

SN - 9783540476993

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 1

EP - 16

BT - Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings

PB - Springer

ER -

Au MH, Liu JK, Yuen TH, Wong DS. ID-based ring signature scheme secure in the standard model. In Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer. 2006. p. 1-16. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).