How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
On the generic construction of identity-based signatures with additional properties
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Escrowed linkability of ring signatures and its applications
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Short linkable ring signatures revisited
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Identity-based strong multi-designated verifiers signatures
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Short (identity-based) strong designated verifier signature schemes
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Efficient identity based ring signature
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Accumulators from bilinear pairings and applications
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Identity based ring signature: why, how and what next
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Short linkable ring signatures for e-voting, e-cash and attestation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Generic construction of (identity-based) perfect concurrent signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
The power of identification schemes
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Efficient identity-based signatures secure in the standard model
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
ID-Based ring signature scheme secure in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
Security proof of sakai-kasahara's identity-based encryption scheme
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
A provably secure ring signature scheme in certificateless cryptography
ProvSec'07 Proceedings of the 1st international conference on Provable security
ProvSec'10 Proceedings of the 4th international conference on Provable security
Hi-index | 0.00 |
Versatility in cryptography is interesting. Instead of building a secure scheme from another secure one, this paper presents an oxymoron making use of the insecurity of a scheme to give useful feature in another context. We show the insecurity of the batch verification algorithms in Cui et al.'s work about an identity-based (ID-based) signature scheme. Following Chow et al.'s idea in EuroPKI 2005, we turn such attack into a secure ID-based ring signature scheme. We also showhowto add linkability. We present two applications of our scheme, which are a short ID-based strong designated verifier signature scheme and an ID-based ad-hoc anonymous identification scheme, with an extension secure against a concurrent man-in-the-middle attack.