ID-Based ring signature scheme secure in the standard model

  • Authors:
  • Man Ho Au;Joseph K. Liu;Tsz Hon Yuen;Duncan S. Wong

  • Affiliations:
  • Centre for Information Security Research, School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia;Department of Computer Science, University of Bristol, Bristol, UK;Department of Information Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong;Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong

  • Venue:
  • IWSEC'06 Proceedings of the 1st international conference on Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The only known construction of ID-based ring signature schemes which maybe secure in the standard model is to attach certificates to non-ID-based ring signatures. This method leads to schemes that are somewhat inefficient and it is an open problem to find more efficient and direct constructions. In this paper, we propose two such constructions. Our first scheme, with signature size linear in the cardinality of the ring, is secure in the standard model under the computational Diffie-Hellman assumption. The second scheme, achieving constant signature size, is secure in a weaker attack model (the selective ID and selective chosen message model), under the Diffie-Hellman Inversion assumption.