On the security models of (threshold) ring signature schemes

Joseph K. Liu, Duncan S. Wong

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

23 Citations (Scopus)

Abstract

We make fine-grained distinctions on the security models for provably secure ring signature schemes. Currently there are two commonly used security models which are specified by Rivest et al. [15] and Abe et al. [1]. They offer different levels of security. In this paper, we introduce a new but compatible model whose security level can be considered to be lying in between these two commonly used models. It is important to make fine-grained distinctions on the security models because some schemes may be secure in some of the models but not in the others. In particular, we show that the bilinear map based ring signature scheme of Boneh et al. [4], which have been proven secure in the weakest model (the one specified by Rivest et al. [15]), is actually insecure in stronger models (the new model specified by us in this paper and the one specified by Abe et al. [1]). We also propose a secure modification of their scheme for each of the two stronger models. In addition, we propose a threshold ring signature scheme using bilinear maps and show its security against adaptive adversaries in the strongest model defined in this paper. Throughout the paper, we carry out all of the security analyses under the random oracle assumption.

Original languageEnglish
Title of host publication7th International Conference on Information Security and Cryptology - ICISC 2004
PublisherSpringer
Pages204-217
Number of pages14
Publication statusPublished - 2005
Externally publishedYes
Event7th International Conference on Information Security and Cryptology - ICISC 2004 - Seoul, Korea, Republic of (South)
Duration: 2 Dec 20043 Dec 2004

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
ISSN (Print)0302-9743

Conference

Conference7th International Conference on Information Security and Cryptology - ICISC 2004
CountryKorea, Republic of (South)
CitySeoul
Period2/12/043/12/04

Keywords

  • Anonymity
  • Bilinear Maps
  • Ring Signature
  • Security Models

Cite this