Two-party (blind) ring signatures and their applications

Man Ho Allen Au, Willy Susilo

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

1 Citation (Scopus)

Abstract

Ring signatures, introduced by Rivest, Shamir and Tauman, attest the fact that one member from a ring of signers has endorsed the message but no one can identify who from the ring is actually responsible for its generation. It was designed canonically for secret leaking. Since then, various applications have been discovered. For instance, it is a building block of optimistic fair exchange, destinated verifier signatures and ad-hoc key exchange. Interestingly, many of these applications require the signer to create a ring signature on behalf of two possible signers (a two-party ring signature) only. An efficient two-party ring signature scheme due to Bender, Katz, and Morselli, is known. Unfortunately, it cannot be used in many of the aforementioned applications since it is secure only in a weaker model. In this paper, we revisit their construction and proposed a scheme that is secure in the strongest sense. In addition, we extend the construction to a two-party blind ring signature. Our proposals are secure in the standard model under well-known number-theoretic assumptions. Finally, we discuss the applications of our construction, which include designated verifier signatures, optimistic fair exchange and fair outsourcing of computational task.
Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 10th International Conference, ISPEC 2014, Proceedings
PublisherSpringer Verlag
Pages403-417
Number of pages15
ISBN (Print)9783319063195
DOIs
Publication statusPublished - 1 Jan 2014
Externally publishedYes
Event10th International Conference on Information Security Practice and Experience, ISPEC 2014 - Fuzhou, China
Duration: 5 May 20148 May 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8434 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Information Security Practice and Experience, ISPEC 2014
Country/TerritoryChina
CityFuzhou
Period5/05/148/05/14

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Two-party (blind) ring signatures and their applications'. Together they form a unique fingerprint.

Cite this