On the security models of (threshold) ring signature schemes

Joseph K. Liu, Duncan S. Wong

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)

Abstract

We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. [15] and Abe et al. [1]. They offer different levels of security. In this paper, we introduce a new but compatible model whose security level can be considered to be lying in between these two commonly used models. It is important to make fine-grained distinctions on the security models because some schemes may be secure in some of the models but not in the others. In particular, we show that the bilinear map based ring signature scheme of Boneh et al. [4], which have been proven secure in the weakest model (the one specified by Rivest et al. [15]), is actually insecure in stronger models (the new model specified by us in this paper and the one specified by Abe et al. [1]). We also propose a secure modification of their scheme for each of the two stronger models. In addition, we propose a threshold ring signature scheme using bilinear maps and show its security against adaptive adversaries in the strongest model defined in this paper. Throughout the paper, we carry out all of the security analyses under the random oracle assumption.

Original languageEnglish
Title of host publication7th International Conference on Information Security and Cryptology - ICISC 2004
PublisherSpringer
Pages204-217
Number of pages14
Publication statusPublished - 2005
Externally publishedYes
Event7th International Conference on Information Security and Cryptology - ICISC 2004 - Seoul, Korea, Republic of (South)
Duration: 2 Dec 20043 Dec 2004

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
ISSN (Print)0302-9743

Conference

Conference7th International Conference on Information Security and Cryptology - ICISC 2004
CountryKorea, Republic of (South)
CitySeoul
Period2/12/043/12/04

Keywords

  • Anonymity
  • Bilinear Maps
  • Ring Signature
  • Security Models

Cite this

Liu, J. K., & Wong, D. S. (2005). On the security models of (threshold) ring signature schemes. In 7th International Conference on Information Security and Cryptology - ICISC 2004 (pp. 204-217). (Lecture Notes in Computer Science). Springer.
Liu, Joseph K. ; Wong, Duncan S. / On the security models of (threshold) ring signature schemes. 7th International Conference on Information Security and Cryptology - ICISC 2004. Springer, 2005. pp. 204-217 (Lecture Notes in Computer Science).
@inproceedings{cc20eb9614fe4e2a9e9dd805b8a81ee2,
title = "On the security models of (threshold) ring signature schemes",
abstract = "We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. [15] and Abe et al. [1]. They offer different levels of security. In this paper, we introduce a new but compatible model whose security level can be considered to be lying in between these two commonly used models. It is important to make fine-grained distinctions on the security models because some schemes may be secure in some of the models but not in the others. In particular, we show that the bilinear map based ring signature scheme of Boneh et al. [4], which have been proven secure in the weakest model (the one specified by Rivest et al. [15]), is actually insecure in stronger models (the new model specified by us in this paper and the one specified by Abe et al. [1]). We also propose a secure modification of their scheme for each of the two stronger models. In addition, we propose a threshold ring signature scheme using bilinear maps and show its security against adaptive adversaries in the strongest model defined in this paper. Throughout the paper, we carry out all of the security analyses under the random oracle assumption.",
keywords = "Anonymity, Bilinear Maps, Ring Signature, Security Models",
author = "Liu, {Joseph K.} and Wong, {Duncan S.}",
year = "2005",
language = "English",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "204--217",
booktitle = "7th International Conference on Information Security and Cryptology - ICISC 2004",

}

Liu, JK & Wong, DS 2005, On the security models of (threshold) ring signature schemes. in 7th International Conference on Information Security and Cryptology - ICISC 2004. Lecture Notes in Computer Science, Springer, pp. 204-217, 7th International Conference on Information Security and Cryptology - ICISC 2004, Seoul, Korea, Republic of (South), 2/12/04.

On the security models of (threshold) ring signature schemes. / Liu, Joseph K.; Wong, Duncan S.

7th International Conference on Information Security and Cryptology - ICISC 2004. Springer, 2005. p. 204-217 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - On the security models of (threshold) ring signature schemes

AU - Liu, Joseph K.

AU - Wong, Duncan S.

PY - 2005

Y1 - 2005

N2 - We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. [15] and Abe et al. [1]. They offer different levels of security. In this paper, we introduce a new but compatible model whose security level can be considered to be lying in between these two commonly used models. It is important to make fine-grained distinctions on the security models because some schemes may be secure in some of the models but not in the others. In particular, we show that the bilinear map based ring signature scheme of Boneh et al. [4], which have been proven secure in the weakest model (the one specified by Rivest et al. [15]), is actually insecure in stronger models (the new model specified by us in this paper and the one specified by Abe et al. [1]). We also propose a secure modification of their scheme for each of the two stronger models. In addition, we propose a threshold ring signature scheme using bilinear maps and show its security against adaptive adversaries in the strongest model defined in this paper. Throughout the paper, we carry out all of the security analyses under the random oracle assumption.

AB - We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. [15] and Abe et al. [1]. They offer different levels of security. In this paper, we introduce a new but compatible model whose security level can be considered to be lying in between these two commonly used models. It is important to make fine-grained distinctions on the security models because some schemes may be secure in some of the models but not in the others. In particular, we show that the bilinear map based ring signature scheme of Boneh et al. [4], which have been proven secure in the weakest model (the one specified by Rivest et al. [15]), is actually insecure in stronger models (the new model specified by us in this paper and the one specified by Abe et al. [1]). We also propose a secure modification of their scheme for each of the two stronger models. In addition, we propose a threshold ring signature scheme using bilinear maps and show its security against adaptive adversaries in the strongest model defined in this paper. Throughout the paper, we carry out all of the security analyses under the random oracle assumption.

KW - Anonymity

KW - Bilinear Maps

KW - Ring Signature

KW - Security Models

UR - http://www.scopus.com/inward/record.url?scp=24944466394&partnerID=8YFLogxK

M3 - Conference Paper

T3 - Lecture Notes in Computer Science

SP - 204

EP - 217

BT - 7th International Conference on Information Security and Cryptology - ICISC 2004

PB - Springer

ER -

Liu JK, Wong DS. On the security models of (threshold) ring signature schemes. In 7th International Conference on Information Security and Cryptology - ICISC 2004. Springer. 2005. p. 204-217. (Lecture Notes in Computer Science).