A note on an identity-based ring signature scheme with signer verifiability (Q627180): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(2 intermediate revisions by 2 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.tcs.2010.11.024 / rank
Normal rank
 
Property / cites work
 
Property / cites work: Q3495643 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-based ring signatures from RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security arguments for digital signatures and blind signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the probability that \(k\) positive integers are relatively prime / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474199 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: ID-Based Blind Signature and Ring Signature from Pairings / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.TCS.2010.11.024 / rank
 
Normal rank

Latest revision as of 22:40, 9 December 2024

scientific article
Language Label Description Also known as
English
A note on an identity-based ring signature scheme with signer verifiability
scientific article

    Statements

    A note on an identity-based ring signature scheme with signer verifiability (English)
    0 references
    0 references
    21 February 2011
    0 references
    \textit{J. Herranz} [Theor. Comput. Sci. 389, No.~1--2, 100--117 (2007; Zbl 1143.94015)] proposed an identity-based ring signature scheme where a valid signature can be given by any member of a set of signers without revealing the identity of the signer. Furthermore, the scheme has the convertibility or signer verifiability property, i.e., a signer from the ring can prove his authorship of a signature by revealing some random numbers that were used for the signature. The author Jung Yeon Hwang shows in the paper under review that the scheme is vulnerable to a key recovery attack. The knowledge of two valid ring signatures together with their authorship proofs can be used to recover a secret key with high probability. The author shows that a small modification, and even simplification, of the original scheme leads to an unforegable scheme. The author provides formal definitions of the unforgeability. He distinguishes two kinds of unforgeability of the modified scheme. The first one is the usal existential unforgeability of a ring signature. The second one considers the unforgeability of the authorship proof. This second notion is further split in two kinds of forgery. The first one deals with a forger who wants to reveal an authorship proof and a signing key. In the second one the forger knows a private key and want to forge an authorship proof of a valid signature.
    0 references
    0 references
    identity-based signature
    0 references
    ring signature
    0 references
    signer verifiability
    0 references

    Identifiers