Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Two extensions of the ring signature scheme of Rivest-Shamir-Taumann

Published: 01 April 2012 Publication History

Abstract

Two extensions of RST (Rivest, Shamir and Taumann) ring signature are proposed which keep the form of RST ring signature unchanged. One extension is to implement the verifiability property with which the real signer is able to prove that she actually signed the ring signature if she publishes her secret value. In contrast to the available verifiable ring signatures, this scheme is very simple, secure and efficient. In this scheme only the glue value of RST ring signature is replaced by the output of a hash function which takes as input a secret value and some signature parameters and the real signer is able to prove himself any times. The other extension is to construct an anonymous subliminal channel in RST ring signature so that the subliminal sender (the real signer) is able to keep herself subliminal anonymous to the subliminal receiver. The subliminal anonymity is implemented for the first time in this paper. In addition, if the sender wants to revoke the subliminal anonymity, she is able to use the first extension.

References

[1]
M. Abe, M.Ohkubo, K.Suzuki, 1-out-of-n Signatures from a Variety of Keys, Advances in Cryptology: Proceedings of ASIACRYPT2002: 415-432.
[2]
Bellare, M. and Rogaway, P., Optimal asymmetric encryption: how to encrypt with RSA. In: LNCS, vol. 950. Springer-Verlag. pp. 92-111.
[3]
J.-M. Bohli, R. Steinwandt, On subliminal channels in deterministic signature schemes, in: The 7th Annual International Conference on Information Security and Cryptology, ICISC 2004, LNCS 3506, 2005, pp. 182-194.
[4]
Chang, S., Wang, D.-S. and Mu, Y., Certificateless threshold ring signature. Information Sciences. v179. 3685-3696.
[5]
Chen, C.-L. and Liu, M.-H., A traceable E-cash transfer system against blackmail via subliminal channel. Electronic Commerce Research and Applications. v8. 327-333.
[6]
Herranz, J., Identity-based ring signatures from RSA. Theoretical Computer Science. v389. 100-117.
[7]
J. Herranz, G. Saez, Forking Lemmas for Ring Schemes, Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings., LNCS 2904, pp. 266-279.
[8]
Komano, Y., Ohta, K., Shimbo, A. and Kawamura, S., Toward the fair anonymous signatures: deniable ring signatures. In: Pointcheval, D. (Ed.), LNCS 3860, Springer-Verlag, Berlin Heidelberg. pp. 174-191.
[9]
Lee, K.-C., Wen, H.-A. and Hwang, T., Convertible ring signature. IEE Proceedings of the Communications. v152 i4. 411-414.
[10]
Lee, N.-Y. and Ho, P.-H., Digital signature with a threshold subliminal channel. IEEE Transactions on Consumer Electronics. v49 i4. 1240-1242.
[11]
Lin, D.-R., Wang, C.-I. and Zhang, Z.-K., A digital signature with multiple subliminal channels and its applications. Computers and Mathematics with Applications. v60. 276-284.
[12]
J. LV and X. WANG, Verifiable Ring Signature, in CANS'03 -Third International Workshop on Cryptology and Network Security, DMS Proceedings, U.S.A, Sep. 2003, 663-665.
[13]
Naor, M., Deniable ring authentication. In: LNCS 2442, Springer-Verlag. pp. 481-498.
[14]
R.-L.Rivest, A. Shamir, Y. Tauman, How to leak a secret, in: Proc. Advances in Cryptology, ASIACRYPT'01, 2001, LNCS 2248, pp. 552-565.
[15]
Simmons, G.-J., The history of subliminal channels. IEEE Journal On Selected Areas In Communication. v16 i4. 452-462.
[16]
Simmons, G.-J., Subliminal communication is easy using the DSA. In: Advances in Cryptology: Proceedings of EURO- CRYPT'93, Springer-Verlag, Berlin. pp. 218-232.
[17]
Wang, C.-H. and Liu, C.-Y., A new ring signature scheme with signer-admission property. Information Sciences. v177. 747-754.
[18]
Young, A. and Yung, M., Kleptography: using cryptography against cryptography. In: Advances in Cryptology- Proc. of EUROCRYPT'97, Springer-Verlag, Berlin. pp. 62-74.
[19]
Yu, J., Forward-secure identity-based signature: security notions and construction. Information Sciences. v181. 648-660.

Cited By

View all
  • (2022)The Applications of Blockchain in the Covert CommunicationWireless Communications & Mobile Computing10.1155/2022/46180072022Online publication date: 1-Jan-2022
  • (2012)Generic security-amplifying methods of ordinary digital signaturesInformation Sciences: an International Journal10.1016/j.ins.2012.03.006201(128-139)Online publication date: 1-Oct-2012

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Information Sciences: an International Journal
Information Sciences: an International Journal  Volume 188, Issue
April, 2012
359 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 01 April 2012

Author Tags

  1. Anonymous subliminal channel
  2. Cryptography
  3. Existential unforgeability
  4. Verifiable ring signature

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)The Applications of Blockchain in the Covert CommunicationWireless Communications & Mobile Computing10.1155/2022/46180072022Online publication date: 1-Jan-2022
  • (2012)Generic security-amplifying methods of ordinary digital signaturesInformation Sciences: an International Journal10.1016/j.ins.2012.03.006201(128-139)Online publication date: 1-Oct-2012

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media