A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Convertible Undeniable Signatures
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Hi-index | 0.00 |
Ring signature was first introduced by Rivest, Shamir and Tanman in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, he is unable to tell which member actually produced the signature. Ring signature provides an elegant way to leak authoritative secrets in an anonymous way, and to implement designated-verifier signature schemes which can authenticate emails without undesired side effects. In this paper, we first propose a ring signature scheme based on ElGamal signature scheme. Comparing to ring signature based on RSA algorithm, the proposed scheme has three advantages. First, all ring members can use the same prime number p and operate in the same domain. Second, the proposed ring signature is inherently a convertible ring signature and enables the actual message signer to prove to a verifier that only he is capable of generating the ring signature. Third, multi-signer ring signature schemes can be generated from ElGamal signature schemes to increase the level of confidence or enforce cross organizational joint message signing.