Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

2.10

CiteScore

Shin-Jia Hwang This email address is being protected from spambots. You need JavaScript enabled to view it.1 and Jyong-Ye Chen1

1Department of Computer Science and Information Engineering, Tamkang University, Tamsui, Taiwan 251, R.O.C.


 

Received: November 18, 2011
Accepted: April 10, 2012
Publication Date: December 1, 2012

Download Citation: ||https://doi.org/10.6180/jase.2012.15.4.08  


ABSTRACT


Hwang and Cheng proposed the first strong designated-verifier ring signature scheme providing one-out-of-all signer anonymity to hide the actual signer’s identity. Their scheme also provides signer admission to admit who the actual signer is. However, the computation and communication costs caused by the signer admission are heavy because their scheme needs all ring members’ Schnorr promises. To reduce the computation and communication costs without damaging one-out-of-all signer anonymity, an efficient strong designated-verifier ring signature scheme providing maximal signer anonymity is proposed and provides the same security properties. Our scheme is more efficient than Hwang and Cheng’s scheme.


Keywords: Ring Signatures, Designated Verifier Signatures, Anonymity, Signatures


REFERENCES


  1. [1] Diffie, W. and Hellman, M., “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. 22, pp. 644654 (1976).
  2. [2] Chaum, D. and Heyst, E. V., “Group Signatures,” Advances in Cryptology-Eurocrypt’91, LNCS 547, Springer Verlag, New York, pp. 257265 (1991).
  3. [3] Lee, C.-C., Chang, T.-Y. and Hwang, M.-S., “A New Group Signature Scheme Based on the Discrete Logarithm,” Journal of Information Assurance and Security, Vol. 5, pp. 5457 (2010).
  4. [4] Rivest, R. L., Shamir, A. and Tauman, Y., “How to Leak a Secret,” Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, Springer-Verlag, Berlin, pp. 552 565 (2001).
  5. [5] Bresson, E., Stern, J. and Szydlo, M., “Threshold Ring Signatures and Applications to Ad-Hoc Groups,” Advances in Cryptology-CRYPTO’02, LNCS 2442, Spring-Verlag, Berlin, pp. 465480 (2002).
  6. [6] Zhang, F. and Kim, K., “ID-Based Blind Signature and Ring Signature from Pairings,” Advance in Cryptology-ASIACRYPT 2002, LNCS 2501, Springer-Verlag, Berlin, pp. 629637 (2002).
  7. [7] Liu, J. K., Wei, V. K. and Wong, D. S.,“Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups,” Information Security and Privacy, LNCS 3108, Springer Verlag, Berlin, pp. 325335 (2004).
  8. [8] Lee, K.-C., Wen, H.-A. and Hwang, T., “Convertible Ring Signature,” Communications, IEE Proceedings, Vol. 152, pp. 411414 (2005).
  9. [9] Ren, J. and Harn, L., “Generalized Ring Signature,” IEEE Transactions on Dependable and Secure Computing, Vol. 5, pp. 155163 (2008).
  10. [10] Wang, H., Zhang, F. and Sun, Y., “Cryptanalysis of a Generalized Ring Signature Scheme,” IEEE Transactions on Dependable and Secure Computing, Vol. 6, pp. 149151 (2009).
  11. [11] Xiong, H., Qin, Z. and Li, F., “An Anonymous Sealed-Bid Electronic Auction Based on Ring Signature Scheme,” International Journal of Network Security, Vol. 8, pp. 235242 (2009).
  12. [12] Jakobsson, M., Sako, K. and Impagliazzo, R., “Designated Verifier Proofs and Their Applications,” Advances in Cryptology-Eurocrypt’96, LNCS 1070, Springer Verlag, Berlin, pp. 143154 (1996).
  13. [13] Saeednia, S., Kremer, S. and Markowitch, O., “An Efficient Strong Designated Verifier Signature Scheme,” Information Security and Cryptology-INCISC 2003, LNCS 2971, Springer-Verlag, Berlin, pp. 4054 (2003).
  14. [14] Lee, J. S. and Chang, J. H., “Strong Designated Verifier Ring Signature Scheme,” Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, Springer-Verlag, Netherlands, pp. 543547 (2007).
  15. [15] Wu, L. and Li, D., “Strong Designated Verifier IDBased Ring Signature Scheme,” Information Science and Engineering, 2008, ISISE’08, International Symposium, Vol. 1, Shanghai, P.R.O.C., Dec. 2022, pp. 294298 (2008).
  16. [16] Hwang, S.-J. and Cheng, K.-L., “A Ring Signature Scheme with Strong Designated Verifiers to Provide Signer Anonymity,” Workshop on Cryptography and Information Security, NCS 2009, Taipei, Taiwan, R.O.C., Dec., pp. 5869 (2009).
  17. [17] Cormen, T. H., Leiserson, C. E. and Rivest, R. L., Introduction to Algorithms, MIT Press, New York, (2001).