Identity-based ring signature scheme under standard model

An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. For l members of a ring,the signature consists of l+1 group elements and requires l+1 pairings...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG Yue-yu, LI Hui, WANG Yu-min
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74654901/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537554715770880
author ZHANG Yue-yu
LI Hui
WANG Yu-min
author_facet ZHANG Yue-yu
LI Hui
WANG Yu-min
author_sort ZHANG Yue-yu
collection DOAJ
description An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. For l members of a ring,the signature consists of l+1 group elements and requires l+1 pairings to verify. It has shorter public parameter size and more efficiency compared with current signature scheme.
format Article
id doaj-art-8b788e8691e34089b4a9469cab842733
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-8b788e8691e34089b4a9469cab8427332025-01-14T08:33:07ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01404474654901Identity-based ring signature scheme under standard modelZHANG Yue-yuLI HuiWANG Yu-minAn identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. For l members of a ring,the signature consists of l+1 group elements and requires l+1 pairings to verify. It has shorter public parameter size and more efficiency compared with current signature scheme.http://www.joconline.com.cn/zh/article/74654901/ring signaturestandard modelidentity based cryptographycomputational Diffie-Hellman assumption
spellingShingle ZHANG Yue-yu
LI Hui
WANG Yu-min
Identity-based ring signature scheme under standard model
Tongxin xuebao
ring signature
standard model
identity based cryptography
computational Diffie-Hellman assumption
title Identity-based ring signature scheme under standard model
title_full Identity-based ring signature scheme under standard model
title_fullStr Identity-based ring signature scheme under standard model
title_full_unstemmed Identity-based ring signature scheme under standard model
title_short Identity-based ring signature scheme under standard model
title_sort identity based ring signature scheme under standard model
topic ring signature
standard model
identity based cryptography
computational Diffie-Hellman assumption
url http://www.joconline.com.cn/zh/article/74654901/
work_keys_str_mv AT zhangyueyu identitybasedringsignatureschemeunderstandardmodel
AT lihui identitybasedringsignatureschemeunderstandardmodel
AT wangyumin identitybasedringsignatureschemeunderstandardmodel