@inproceedings{9d2c8607a4aa43e6b19929c7a56de146,
title = "ID-based ring signature scheme secure in the standard model",
abstract = "The only known construction of ID-based ring signature schemes which maybe secure in the standard model is to attach certificates to non-ID-based ring signatures. This method leads to schemes that are somewhat inefficient and it is an open problem to find more efficient and direct constructions. In this paper, we propose two such constructions. Our first scheme, with signature size linear in the cardinality of the ring, is secure in the standard model under the computational Diffie-Hellman assumption. The second scheme, achieving constant signature size, is secure in a weaker attack model (the selective ID and selective chosen message model), under the Diffie-Hellman Inversion assumption.",
author = "Au, {Man Ho Allen} and Liu, {Joseph K.} and Yuen, {Tsz Hon} and Wong, {Duncan S.}",
year = "2006",
month = jan,
day = "1",
language = "English",
isbn = "3540476997",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "1--16",
booktitle = "Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings",
address = "Germany",
note = "1st International Workshop on Security, IWSEC 2006 ; Conference date: 23-10-2006 Through 24-10-2006",
}