Education, Science, Technology, Innovation and Life
Open Access
Sign In

Efficient identity based ring signature scheme in prime order group

Download as PDF

DOI: 10.23977/jeis.2021.060211 | Downloads: 29 | Views: 1163

Author(s)

Jingyuan Li 1

Affiliation(s)

1 Shaanxi Normal University, Xi’an, China

Corresponding Author

Jingyuan Li

ABSTRACT

Aiming at the problem of long signature generation and verification time caused by low operation efficiency in ring signature algorithm based on composite order group, an asymmetric identity based ring signature scheme based on prime order group is proposed. The model definition and specific identity based ring signature scheme design of the proposed scheme are described, and the correctness and security of the proposed scheme are analyzed. Finally, the efficiency of the core operation part of the algorithm is explained. Compared with the correlation signature algorithm based on composite order group, the optimization has a great improvement in operation overhead and performance, and the designed scheme is unforgeable. The designed signature scheme meets the unconditional anonymity and unforgeability of ring signature.

KEYWORDS

Prime order, identity based signature, ring signature, anonymity

CITE THIS PAPER

Jingyuan Li. Efficient identity based ring signature scheme in prime order group. Journal of Electronics and Information Science (2021) 6: 69-74. DOI: http://dx.doi.org/10.23977/jeis.2021.060211.

REFERENCES

[1]RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret[A]. Proc ASIACRYPT’0l[C].Springer-Verlag,2001.552-565.
[2]CHAUMD, HEYST VE.Group sjgnatures[A].nDc CROCRYPrr’9l[C].Springer.Verlag,1991.257-265.
[3]SHACHAMH,WATERS B. Efficient ring signatures with-out random oracles[C].1 0th International Conference on Practice and Theory in Public-Key Cryptography,2007. 66-1 80.
[4]BENDER A,KATZ J,MORSELLI R. Ring signatures:Stronger definitions,and constructions without random oracles[J].Journal of Cryptology,2009,22:1 1 4-1 38.
[5]SHIM K. An efficient ring signature scheme from pairings[J].Information Sciences,201 5,300:63-69.
[6]YEON H,YOUNG C,SOOK C,et al. Collusion-resistant convertible ring signature schemes[J].Science China Information Sciences,201 5,58:01 21 08-01 21 23.
[7]ZHANG X,LIU Z,WANG X. Ring signature scheme from multi-linear maps in the standard model[C].1 0th International Conference on P2P,Parallel,Grid,Cloud and Internet Computing,201 5:859-864.
[8]BOYEN X. Unconditionally anonymous ring and mesh signatures[J].Journal of Cryptology,201 6,29:729-774.
[9]ZHANG F,KIM K.ID-based blind signature and ring sig-nature from pairings[J].Advances in Cryptology-ASIA-CRYPT.2002,LNCS,2501 :533-547.
[10]HERRANZ J,SAEZ G. New identity-based ring signature schemes[C].6th International Conference on Information and Communications Security,2004,LNCS,3269:27-29.
[11]FREEMAN D M. Converting pairing-based cryptosystems from composite-order groups to prime-order groups[C]//Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2010: 44-61.
[12]FREEMAN D M. Converting pairing-based cryptosystems from composite-order groups to prime-order groups[C]//Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2010: 44-61.
[13]AU M H, LIU J K, SUSILO W, et al.  Realizing  fully  secure  unrestricted  ID-based  ring  signature  in  the  standard  model  based  on HIBE[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(12): 1909-1922.

Downloads: 6435
Visits: 251299

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.