File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1966913.1966947
- Scopus: eid_2-s2.0-79955983400
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Threshold ring signature without random oracles
Title | Threshold ring signature without random oracles |
---|---|
Authors | |
Keywords | Anonymity Ring signatures Threshold ring signatures |
Issue Date | 2011 |
Citation | Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, p. 261-267 How to Cite? |
Abstract | In this paper, we present the notion and construction of threshold ring signature without random oracles. This is the first scheme in the literature that is proven secure in the standard model. Our scheme extends the Shacham-Waters signature from PKC 2007 in a non-trivial way. We note that our technique is specifically designed to achieve a threshold ring signature in the standard model. Interestingly, we can still maintain the signature size to be the same as the Shacham-Waters signature, while only a tiny computation cost is added. Copyright 2011 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/260200 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yuen, Tsz Hon | - |
dc.contributor.author | Liu, Joseph K. | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Zhou, Jianying | - |
dc.date.accessioned | 2018-09-12T02:00:42Z | - |
dc.date.available | 2018-09-12T02:00:42Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, 2011, p. 261-267 | - |
dc.identifier.uri | http://hdl.handle.net/10722/260200 | - |
dc.description.abstract | In this paper, we present the notion and construction of threshold ring signature without random oracles. This is the first scheme in the literature that is proven secure in the standard model. Our scheme extends the Shacham-Waters signature from PKC 2007 in a non-trivial way. We note that our technique is specifically designed to achieve a threshold ring signature in the standard model. Interestingly, we can still maintain the signature size to be the same as the Shacham-Waters signature, while only a tiny computation cost is added. Copyright 2011 ACM. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | - |
dc.subject | Anonymity | - |
dc.subject | Ring signatures | - |
dc.subject | Threshold ring signatures | - |
dc.title | Threshold ring signature without random oracles | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/1966913.1966947 | - |
dc.identifier.scopus | eid_2-s2.0-79955983400 | - |
dc.identifier.spage | 261 | - |
dc.identifier.epage | 267 | - |