Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Separable and Anonymous Identity-Based Key Issuing
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A ring signature scheme using bilinear pairings
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Identity based threshold ring signature
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Ring signatures without random oracles
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery
Computational Intelligence and Security
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant
Computational Intelligence and Security
Efficient Certificateless Signature Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
MFCS '08 Proceedings of the 33rd international symposium on Mathematical Foundations of Computer Science
On the Definitions of Anonymity for Ring Signatures
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
Blind signature and ring signature schemes: Rehabilitation and attack
Computer Standards & Interfaces
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
Information Security and Cryptology --- ICISC 2008
Practical Short Signature Batch Verification
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Subliminal channels in the identity-based threshold ring signature
International Journal of Computer Mathematics
An efficient and provable secure identity-based ring signcryption scheme
Computer Standards & Interfaces
On the Security of Identity Based Ring Signcryption Schemes
ISC '09 Proceedings of the 12th International Conference on Information Security
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
Identity-committable signatures and their extension to group-oriented ring signatures
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
An efficient anonymous authentication mechanism for delay tolerant networks
Computers and Electrical Engineering
A provably secure ring signature scheme in certificateless cryptography
ProvSec'07 Proceedings of the 1st international conference on Provable security
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
ProvSec'10 Proceedings of the 4th international conference on Provable security
Threshold ring signature without random oracles
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Self-certified ring signatures
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Server-aided signatures verification secure against collusion attack
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Multi-party concurrent signatures
ISC'06 Proceedings of the 9th international conference on Information Security
On the definition of anonymity for ring signatures
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Short linkable ring signatures revisited
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Identity-based strong multi-designated verifiers signatures
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
A fair concurrent signature scheme based on identity
HPCA'09 Proceedings of the Second international conference on High Performance Computing and Applications
Identity based ring signature: why, how and what next
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Generic construction of (identity-based) perfect concurrent signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
ID-Based ring signature scheme secure in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
Ring signature with designated linkability
IWSEC'06 Proceedings of the 1st international conference on Security
Proceedings of the 2012 ACM conference on Computer and communications security
Anonymous identification and designated-verifiers signatures from insecure batch verification
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Strongly-secure identity-based key agreement and anonymous extension
ISC'07 Proceedings of the 10th international conference on Information Security
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
Server-aided signatures verification secure against collusion attack
Information Security Tech. Report
Designated verifier ring signature and ring signcryption
International Journal of Intelligent Information and Database Systems
Certificate-free ad hoc anonymous authentication
Information Sciences: an International Journal
Hi-index | 0.03 |
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates and the need for registering for a certificate before getting the public key. These two features are desirable especially for the efficiency and the real spontaneity of ring signature, where a user can anonymously sign a message on behalf of a group of spontaneously conscripted users including the actual signer. In this paper, we propose a novel construction of ID-based ring signature which only needs two pairing computations for any group size. The proposed scheme is proven to be existential unforgeable against adaptive chosen message-and-identity attack under the random oracle model, using the forking lemma for generic ring signature schemes. We also consider its extension to support the general access structure.