Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Analysis of Revocable-iff-Linked Ring Signature Scheme

Full metadata record
DC Field Value Language
dc.contributor.authorJeong, Ik Rae-
dc.contributor.authorKwon, Jeong Ok-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-08T21:19:27Z-
dc.date.available2021-09-08T21:19:27Z-
dc.date.created2021-06-10-
dc.date.issued2009-01-
dc.identifier.issn0916-8508-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/120895-
dc.description.abstractIn a linkable ring signature scheme, a signer himself selects a set of parties called a "ring" and signs the messages on behalf of the ring. Any party can know whether or not the ring signatures are made by the same signer, although the party cannot know the identity of the actual signer. An, Liu, Susilo, and Yuen proposed an ID-based linkable ring signature scheme and an ID-based revocable-iff-linked ring signature scheme. With a revocable-iff-linked ring signature scheme, any party can recover the identity of the signer, if the signer makes two or more ring signatures. In this paper, we show that Au et al.'s revocable-iff-linked ring signature scheme does not provide anonymity, even if the signer makes only one ring signature. Anonymity is one of the most basic security requirements of ring signatures.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleAnalysis of Revocable-iff-Linked Ring Signature Scheme-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1587/transfun.E92.A.322-
dc.identifier.wosid000263078800038-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E92A, no.1, pp.322 - 325-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE92A-
dc.citation.number1-
dc.citation.startPage322-
dc.citation.endPage325-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorring signature-
dc.subject.keywordAuthoranonymity-
dc.subject.keywordAuthorlinkability-
dc.subject.keywordAuthorrevocability-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE