File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE

TitleRealizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE
Authors
Keywordsanonymity
standard model
Ring signature
HIBE
Issue Date2013
Citation
IEEE Transactions on Information Forensics and Security, 2013, v. 8, n. 12, p. 1909-1922 How to Cite?
AbstractWe describe a secure and unrestricted identity-based ring signature scheme in the standard model. Our construction is provably fully secure in the standard model under static assumptions and is motivated by an existing HIBE scheme. Our observation on the relationship between ID-based ring signatures and HIBE is of interest to researchers in other fields as well. Following the strongest anonymity definition in ring signatures, we define a new level of anonymity for ID-based ring signatures in which the attacker can specify the randomness used in the creation of the user secret key, in addition to the private key generators master key. Our scheme provides unconditional anonymity in this model. © 2013 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/280799
ISSN
2021 Impact Factor: 7.231
2020 SCImago Journal Rankings: 1.613
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorAu, Man Ho-
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorZhou, Jianying-
dc.date.accessioned2020-02-17T14:34:58Z-
dc.date.available2020-02-17T14:34:58Z-
dc.date.issued2013-
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2013, v. 8, n. 12, p. 1909-1922-
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10722/280799-
dc.description.abstractWe describe a secure and unrestricted identity-based ring signature scheme in the standard model. Our construction is provably fully secure in the standard model under static assumptions and is motivated by an existing HIBE scheme. Our observation on the relationship between ID-based ring signatures and HIBE is of interest to researchers in other fields as well. Following the strongest anonymity definition in ring signatures, we define a new level of anonymity for ID-based ring signatures in which the attacker can specify the randomness used in the creation of the user secret key, in addition to the private key generators master key. Our scheme provides unconditional anonymity in this model. © 2013 IEEE.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Information Forensics and Security-
dc.subjectanonymity-
dc.subjectstandard model-
dc.subjectRing signature-
dc.subjectHIBE-
dc.titleRealizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TIFS.2013.2282908-
dc.identifier.scopuseid_2-s2.0-84888085041-
dc.identifier.volume8-
dc.identifier.issue12-
dc.identifier.spage1909-
dc.identifier.epage1922-
dc.identifier.isiWOS:000327345700002-
dc.identifier.issnl1556-6013-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats