File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Threshold ring signature without random oracles

TitleThreshold ring signature without random oracles
Authors
KeywordsAnonymity
Ring signatures
Threshold ring signatures
Issue Date2011
Citation
Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, p. 261-267 How to Cite?
AbstractIn this paper, we present the notion and construction of threshold ring signature without random oracles. This is the first scheme in the literature that is proven secure in the standard model. Our scheme extends the Shacham-Waters signature from PKC 2007 in a non-trivial way. We note that our technique is specifically designed to achieve a threshold ring signature in the standard model. Interestingly, we can still maintain the signature size to be the same as the Shacham-Waters signature, while only a tiny computation cost is added. Copyright 2011 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/260200

 

DC FieldValueLanguage
dc.contributor.authorYuen, Tsz Hon-
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorZhou, Jianying-
dc.date.accessioned2018-09-12T02:00:42Z-
dc.date.available2018-09-12T02:00:42Z-
dc.date.issued2011-
dc.identifier.citationProceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, p. 261-267-
dc.identifier.urihttp://hdl.handle.net/10722/260200-
dc.description.abstractIn this paper, we present the notion and construction of threshold ring signature without random oracles. This is the first scheme in the literature that is proven secure in the standard model. Our scheme extends the Shacham-Waters signature from PKC 2007 in a non-trivial way. We note that our technique is specifically designed to achieve a threshold ring signature in the standard model. Interestingly, we can still maintain the signature size to be the same as the Shacham-Waters signature, while only a tiny computation cost is added. Copyright 2011 ACM.-
dc.languageeng-
dc.relation.ispartofProceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011-
dc.subjectAnonymity-
dc.subjectRing signatures-
dc.subjectThreshold ring signatures-
dc.titleThreshold ring signature without random oracles-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/1966913.1966947-
dc.identifier.scopuseid_2-s2.0-79955983400-
dc.identifier.spage261-
dc.identifier.epage267-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats