Identity-Based Ring Signature Schemes for Multiple Domains
- Authors
- Ki, JuHee; Hwang, Jung Yeon; Lee, Dong Hoon
- Issue Date
- 29-10월-2012
- Publisher
- KSII-KOR SOC INTERNET INFORMATION
- Keywords
- Identity-Based Ring Signature; Privacy; Anonymity; Separability; Multiple Domains
- Citation
- KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.6, no.10, pp.2692 - 2707
- Indexed
- SCIE
SCOPUS
KCI
OTHER
- Journal Title
- KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
- Volume
- 6
- Number
- 10
- Start Page
- 2692
- End Page
- 2707
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/107177
- DOI
- 10.3837/tiis.2012.10.015
- ISSN
- 1976-7277
- Abstract
- A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be selected from arbitrary domains, thereby, giving a signer a wide range of ways to control privacy. In this paper we propose a generic method to construct efficient identity-based ring signature schemes with various levels of separability. We first describe a method to efficiently construct an identity-based ring signature scheme for a single domain, in which a signer can select ring identities by choosing from identities defined only for the domain. Next, we present a generic method for linking ring signatures constructed for a single domain. Using this method, an identity-based ring signature scheme with a compact structure, supporting multiple arbitrary domains can be designed. We show that our method outperforms the best known schemes in terms of signature size and computational costs, and that the security model based on the separability of identity-based ring signatures, presented in this paper, is highly refined and effective by demonstrating the security of all of the proposed schemes, using a model with random oracles.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.