Advanced Search
Volume 30 Issue 4
Dec.  2010
Turn off MathJax
Article Contents
Wang Shao-hui, Zheng Shi-hui, Zhan Tao . Identity-Based Linkable and Convertible Ring Signature[J]. Journal of Electronics & Information Technology, 2008, 30(4): 995-998. doi: 10.3724/SP.J.1146.2007.00549
Citation: Wang Shao-hui, Zheng Shi-hui, Zhan Tao . Identity-Based Linkable and Convertible Ring Signature[J]. Journal of Electronics & Information Technology, 2008, 30(4): 995-998. doi: 10.3724/SP.J.1146.2007.00549

Identity-Based Linkable and Convertible Ring Signature

doi: 10.3724/SP.J.1146.2007.00549 cstr: 32379.14.SP.J.1146.2007.00549
  • Received Date: 2007-04-09
  • Rev Recd Date: 2007-09-20
  • Publish Date: 2008-04-19
  • In this paper, the concepts of identity-based linkable ring signature and linkable convertible ring signature are proposed. Taken Zhang and Kims scheme as an example, a general method is given to add linkability and convertibility to some identity-based ring signatures. Then two efficient schemes are given for the first time, besides the complete anonymity and unforgeability under adaptively chosen message attack, one satisfying linkability, and the other satisfying both linkability and convertibility.
  • loading
  • Shamir A. Identity-based cryptosystems and signatureschemes[J].Advances in CryptologyCrypto.1984, LNCS196:47-53[2]Boneh D and Franklin M. Identity-based encryption fromthe weil pairing[J].Advances in Cryptology.Crypto.2001,LNCS 2139:213-229[3]Rivest R, Shamir A, and Tauman Y. How to leak a secret[J].In: Advances in Cryptology..AsiaCrypt01, Berlin: Springer-Verlag.2001, LNCS 2248:552-565[4]Zhang Fangguo and Kim Kwangjo. ID-based blind signatureand ring signature from pairings[J].Advances in CryptologyAsiaCrypt.2002, LNCS 2501:533-547[5]Herranz J and Saez G. New identity-based ring signatureschemes[J].International Conference on Information andCommunications SecurityICICS.2004, LNCS 3269:27-39[6]Chow S S M, Yiu S M, and Hui L C K. Efficient identitybased ring signature[J].Applied Cryptography and NetworkSecurityACNS.2005, LNCS 3531:499-512[7]Liu J K, Wei V K, and Wong D S. Linkable spontaneousanonymous group signature for Ad-hoc groups (ExtendedAbstract)[J].In: ACISP04, Berlin: Springer-Verlag.2004,LNCS 3108:325-335[8]Mao Ho Au, Chow S S M, Susilo W, and Tsang P P. Shortlinkable ring signatures revisited. In: EuroPKI 2006, Berlin:Springer-Verlag, 2006, LNCS 4043: 101-115.[9]Lee K C, Wen H A, and Hwang T. Convertible ringsignature[J].IEE Proc-Commun.2005, 152(4):411-414[10]Bresson E, Stern J, and Szydlo M. Threshold ringsignatures and applications to Ad-hoc group. In: Crypto2002, Berlin: Springer-Verlag, 2002, LNCS 2442: 465-480.[11]Chow S S M, Liu R W C, Hui L C K, and Yiu S M.Identity-based ring signature: why, how and what next. In:EuroPKI 2005, Berlin: Springer-Verlag, 2005, LNCS 3545:144-161.[12]Abe M, Ohkubo M, and Suzuki K. 1-out-of-n signaturesfrom a variety of keys. Advances in Cryptology.AsiaCrypt2002, LNCS 2501: 415-432.[13]Gao Wei, Wang Guilin, Wang Xueli, and Xie Dongqing.Controllable ring signatures. The 7th InternationalWorkshop on Information Security Applications (WISA2006), Springer-Verlag, 2006, LNCS 4298: 1-14.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3352) PDF downloads(810) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return