Autosoft Journal

Online Manuscript Access


Schnorr Ring Signature Scheme with Designated Revocability


Authors



Abstract

Ring signatures enable a user to sign a message so that a ring of possible signers is identified, without revealing exactly which member of that ring actually generated the signature. In some situations, however, an actual signer may possibly want to expose himself, for instance, if doing so, he will acquire an enormous benefit. In this paper, we present a Schnorr ring signature scheme with designated revocability, providing a confirmation procedure, in which the real signer is able to convince a designated party that he is the one who generates the signature. The confirming proof is non-transferable, which only can be triggered by the signer. Meanwhile, the scheme satisfies unconditional anonymity, and has been proven to be existentially unforgeable under adaptive-chosen message attack in the random oracle.


Keywords


Pages

Total Pages: 11
Pages: 739-749

DOI
10.1080/10798587.2012.10643284


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 18
Issue: 6
Year: 2012

Cite this document


References

D. Chaum, and E. V. Heyst, Group Signatures, Advances in Cryptology-EUROCRYPT’91,LNCS 547. Berlin: Springer-Verlag, 1991, pp. 257–265.

M. Jakobsson, K Sako, and R Impagliazzo, Designated Verifier Proofs and Their Applications, Advances in Cryptology - EUROCRYPT’96, LNCS 1070. Berlin: SpringerVerlag, 1996, pp. 143–154.

R. L. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, Advances in Cryptology - ASIACRYPT 2001, LNCS 2248. Berlin: Springer-Verlag, 2001, pp. 552–565.

R. Cramer, L Damgård, and B. Schoenmakers, Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols, Advances in Cryptology - CRYPTO’94, LNCS 839. Berlin: Springer-Verlag, 1994, pp. 174–187.

E. Bresson, J. Stern, and M. Szydlo, Threshold Ring Signatures and Applications to Ad-hoc Groups, Advances in Cryptology - CRYPTO 2002, LNCS 2442. Berlin: Springer-Verlag, 2002, pp. 75–99.

D. Wong, K Fung, and J. Liu et al, On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST, Information and Communications Security, LNCS 2836. Berlin: Springer-Verlag, 2003, pp. 34–46.

J. Liu, V. Wei, and D. Wong, A Separable Threshold Ring Signature Scheme, Information Security and Cryptology-ICISC 2003, LNCS 2971. Berlin: Springer-Verlag, 2004, pp. 12–26.

S. M. Chow, L. K Hui, and S. M. Yiu, Identity Based Threshold Ring Signature, Information Security and Cryptology-ICISC 2004, LNCS 3506. Berlin: Springer-Verlag, 2005, pp. 218–232.

Y. Dodis, A. Kiayias, and A Nicolosi et al, Anonymous Identification in Ad Hoc Groups, Advances in Cryptology - EUROCRYPT 2004, LNCS 3027. Berlin: Springer-Verlag, 2004, pp. 609–626.

M. H. Au, J. Liu, and T. H. Yuen et al, ID-Based Ring Signature Scheme Secure in the Standard Model, Advances in Information and Computer Security, LNCS 4266. Berlin: Springer-Verlag, 2006, pp. 1–16.

T. Chan, K Fung, and J. Liu et al, Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups, Security in Ad-hoc and Sensor Networks, LNCS 3313. Berlin: SpringerVerlag, 2005, pp. 82–94.

J. Liu, V. Wei, and D. Wong, Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups, Information Security and Privacy, LNCS 3108. Berlin: Springer-Verlag, 2004, pp. 325–335.

P. Tsang, and V. Wei, Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation, Information Security Practice and Experience, LNCS 3439. Berlin: SpringerVerlag, 2005, pp. 48–60.

P. Tsang, V. Wei, and T. Chan et al, Separable Linkable Threshold Ring Signatures, Progress in Cryptology - INDOCRYPT 2004, LNCS 3348. Berlin: Springer-Verlag, 2005, pp. 384–398.

J. Liu, and D. Wong, Linkable Ring Signatures: Security Models and New Schemes (Extended Abstract), Computational Science and Its Applications - ICCSA 2005, LNCS 3481. Berlin: Springer-Verlag, 2005, pp. 614–623.

J. Q. Lv, and X M. Wang, Verifiable Ring Signature, The Third International Workshop on Cryptology and Network Security, DMS Proceedings, USA, 2003, pp. 663–665.

K C. Lee, H. A. Wen, and T. Hwang, Convertible ring signature, Communications, IEEE Proceedings, Tainan, Taiwan: IEEE Press, 2005, pp. 411–414.

Y. Komano, K Ohta, and A. Shimbo et al, Toward the Fair Anonymous Signatures: Deniable Ring Signatures, Topics in Cryptolog - CT-RSA 2006, LNCS 3860. Berlin: Springer-Verlag, 2006, pp. 174–191.

M. Klonowski, L. Krzywiecki, and M. Kutylowski et al, Step-Out Ring Signatures, Mathematical Foundations of Computer Science 2008, LNCS 5162. Berlin: SpringerVerlag, 2008, pp. 431–442.

Schnorr, C.P. "Efficient Signature Generation by Smart Cards." Journal of Cryptology 4.3 (1991): n. pag. Crossref. Web. https://doi.org/10.1007/BF00196725

J. Herranz, and G. Saez, Forking Lemmas for Ring Signature Schemes, Progress in Cryptology - INDOCRYPT 2003, LNCS 2904. Berlin: Springer-Verlag, 2003, pp. 266279.

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)

TWO YEAR CITATIONS PER DOCUMENT (SJR DATA): 0.993 (2018)
SJR: "The two years line is equivalent to journal impact factor ™ (Thomson Reuters) metric."





Journal: 1995-Present


CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/