CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity-based Ring Signature Scheme from Bilinear Pairings
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Identity-Based universal designated verifier signatures
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
On the transferability of private signatures
Information Sciences: an International Journal
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
A strong designated verifier ring signcryption scheme
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
Two extensions of the ring signature scheme of Rivest-Shamir-Taumann
Information Sciences: an International Journal
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Designated verifier ring signature and ring signcryption
International Journal of Intelligent Information and Database Systems
Hi-index | 0.07 |
In this paper, we introduce an extended ring signature scheme in which the actual signer has the ability to admit to having signed a document at his will. Generally speaking, this scheme can be considered as an extension and improvement of the ring signature suggested by Rivest et al. in 2001. The proposed scheme is called signer-admission ring signature which combines the idea of the designated confirmer signatures proposed by Chaum in 1994 and the designated verifier proofs proposed by Jakobsson et al. in 1996. This paper presents a scenario explaining why the signer-admission property is valuable in real-life applications. An actual signer may possibly want to expose himself if, in doing so, he will acquire an enormous benefit. Here, we propose a generic construction of the signer-admission ring signature as well as a demonstration modified from Rivest et al.'s scheme to achieve signer-admission.