Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Ring signatures without random oracles
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Constant-size ID-based linkable and revocable-iff-linked ring signature
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Linkable ring signatures: security models and new schemes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Short linkable ring signatures revisited
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Accumulators from bilinear pairings and applications
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Short linkable ring signatures for e-voting, e-cash and attestation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Separable linkable threshold ring signatures
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
On the security models of (threshold) ring signature schemes
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
ID-Based ring signature scheme secure in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
Ring signature with designated linkability
IWSEC'06 Proceedings of the 1st international conference on Security
Ring signatures: stronger definitions, and constructions without random oracles
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Certificate-Based Signature Schemes without Pairings or Random Oracles
ISC '08 Proceedings of the 11th international conference on Information Security
Efficient Certificate-Based Encryption in the Standard Model
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Certificate-based sequential aggregate signature
Proceedings of the second ACM conference on Wireless network security
Information Security Applications
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Constructions of certificate-based signature secure against key replacement attacks
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Self-certified ring signatures
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Short and efficient certificate-based signature
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
An efficient short certificate-based signature scheme
Journal of Systems and Software
Online/Offline ring signature scheme
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
A forward-secure certificate-based signature scheme in the standard model
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Provably secure certificate-based signature scheme without pairings
Information Sciences: an International Journal
Certificate-free ad hoc anonymous authentication
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper, we propose a new notion called Certificate Based Ring Signature (CBRS) that follows the idea of Certificate Based Encryption (CBE) presented by Gentry in EuroCrypt 2003. It preserves the advantages of CBE such as implicit certificate and no private key escrow. At the same time it inherits the properties of normal ring signature such as anonymity and spontaneity. We provide its security model and a concrete implementation. In addition, we also propose a variant of CBRS, called Certificate Based Linkable Ring Signature (CBLRS). It is similar to CBRS, except with linkability. That is, it allows the public to verify whether two given signatures are generated by the same signer, yet preserves the anonymity of this user. It can be seen as the Certificate Based version of normal linkable ring signature.