Identity-based ring signature scheme under standard model
An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. For l members of a ring,the signature consists of l+1 group elements and requires l+1 pairings...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74654901/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537554715770880 |
---|---|
author | ZHANG Yue-yu LI Hui WANG Yu-min |
author_facet | ZHANG Yue-yu LI Hui WANG Yu-min |
author_sort | ZHANG Yue-yu |
collection | DOAJ |
description | An identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. For l members of a ring,the signature consists of l+1 group elements and requires l+1 pairings to verify. It has shorter public parameter size and more efficiency compared with current signature scheme. |
format | Article |
id | doaj-art-8b788e8691e34089b4a9469cab842733 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-8b788e8691e34089b4a9469cab8427332025-01-14T08:33:07ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01404474654901Identity-based ring signature scheme under standard modelZHANG Yue-yuLI HuiWANG Yu-minAn identity based ring signature scheme using the method of Waters for constructing private key was presented. This scheme is secure in the standard model under the computational Diffie-Hellman assumption. For l members of a ring,the signature consists of l+1 group elements and requires l+1 pairings to verify. It has shorter public parameter size and more efficiency compared with current signature scheme.http://www.joconline.com.cn/zh/article/74654901/ring signaturestandard modelidentity based cryptographycomputational Diffie-Hellman assumption |
spellingShingle | ZHANG Yue-yu LI Hui WANG Yu-min Identity-based ring signature scheme under standard model Tongxin xuebao ring signature standard model identity based cryptography computational Diffie-Hellman assumption |
title | Identity-based ring signature scheme under standard model |
title_full | Identity-based ring signature scheme under standard model |
title_fullStr | Identity-based ring signature scheme under standard model |
title_full_unstemmed | Identity-based ring signature scheme under standard model |
title_short | Identity-based ring signature scheme under standard model |
title_sort | identity based ring signature scheme under standard model |
topic | ring signature standard model identity based cryptography computational Diffie-Hellman assumption |
url | http://www.joconline.com.cn/zh/article/74654901/ |
work_keys_str_mv | AT zhangyueyu identitybasedringsignatureschemeunderstandardmodel AT lihui identitybasedringsignatureschemeunderstandardmodel AT wangyumin identitybasedringsignatureschemeunderstandardmodel |