TY - GEN
T1 - A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract)
AU - Tsang, Patrick P.
AU - Au, Man Ho Allen
AU - Liu, Joseph K.
AU - Susilo, Willy
AU - Wong, Duncan S.
PY - 2010/11/23
Y1 - 2010/11/23
N2 - Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-based signature schemes have been proposed. In 2001, Rivest et al. introduced ring signature that provides irrevocable signer anonymity and spontaneous group formation. In recent years, ID-based ring signature schemes have been proposed and almost all of them are based on bilinear pairings. In this paper, we propose the first ID-based threshold ring signature scheme that is not based on bilinear pairings. We also propose the first ID-based threshold 'linkable' ring signature scheme. We emphasize that the anonymity of the actual signers is maintained even against the private key generator (PKG) of the ID-based system. Finally we show how to add identity escrow to the two schemes. Due to the different levels of signer anonymity they support, the schemes proposed in this paper actually form a suite of ID-based threshold ring signature schemes which is applicable to many real-world applications with varied anonymity requirements.
AB - Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-based signature schemes have been proposed. In 2001, Rivest et al. introduced ring signature that provides irrevocable signer anonymity and spontaneous group formation. In recent years, ID-based ring signature schemes have been proposed and almost all of them are based on bilinear pairings. In this paper, we propose the first ID-based threshold ring signature scheme that is not based on bilinear pairings. We also propose the first ID-based threshold 'linkable' ring signature scheme. We emphasize that the anonymity of the actual signers is maintained even against the private key generator (PKG) of the ID-based system. Finally we show how to add identity escrow to the two schemes. Due to the different levels of signer anonymity they support, the schemes proposed in this paper actually form a suite of ID-based threshold ring signature schemes which is applicable to many real-world applications with varied anonymity requirements.
UR - http://www.scopus.com/inward/record.url?scp=78449233611&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-16280-0_11
DO - 10.1007/978-3-642-16280-0_11
M3 - Conference article published in proceeding or book
SN - 3642162797
SN - 9783642162794
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 166
EP - 183
BT - Provable Security - 4th International Conference, ProvSec 2010, Proceedings
T2 - 4th International Conference on Provable Security, ProvSec 2010
Y2 - 13 October 2010 through 15 October 2010
ER -