ID-Based Deniable Ring Signature with Constant-Size Signature

2011 ◽  
Vol 255-260 ◽  
pp. 2192-2196
Author(s):  
Cheng Yu Hu ◽  
Peng Tao Liu

The ring signature can guarantee the signer’s anonymity. Most proposed ring signature schemes have two problems: One is that the size of ring signature depends linearly on the ring size, and the other is that the signer can shift the blame to victims because of the anonymity. Some authors have studied the constant-size ring signature and deniable ring signature to solve these two problems. This paper shows that an identity-based ring signature scheme with constant size has some security problems by using an insecure accumulator and its verification process does not include the message m. Then we combine the concepts of “constant-size” and “deniable” to form an id-based deniable ring signature with constant-size signature. The new scheme with constant-size signature length is proposed based on an improved accumulator from bilinear pairings and it solves the problem of anonymity abuse.

2012 ◽  
Vol 35 (9) ◽  
pp. 1874 ◽  
Author(s):  
Ai-Jun GE ◽  
Chuan-Gui MA ◽  
Zhen-Feng ZHANG ◽  
Shao-Zhen CHEN

2012 ◽  
Vol 263-266 ◽  
pp. 2906-2910
Author(s):  
De Dong Zhang ◽  
Zhao Feng Ma ◽  
Yi Xian Yang

The revocation of delegated rights and anonymity of proxy signer are essential issues of the proxy signature schemes. Based on the bilinear pairings, an anonymity-revoking proxy signature scheme was proposed. In this scheme, when an original signer found that a proxy signer was malicious or the delegation period was expired, he/she could revoke the malicious proxy signer’s signing capability efficiently through a trusted authority. On the other hand, only the signature from delegation of the original signer could be confirmed by the verifier and the identity of the proxy signer could not be known to the verifier. In appearing of disputation, the verifier could reveal the real identity of the proxy signer with the help of the original signer. This scheme can protect not only the original signer’s benefit but also the proxy signer s privacy.


2013 ◽  
Vol 32 (5) ◽  
pp. 1385-1387 ◽  
Author(s):  
Hua SUN ◽  
Lei GUO ◽  
Xue-feng ZHENG ◽  
Ai-min WANG

Sign in / Sign up

Export Citation Format

Share Document