Skip to main content
Log in

An efficient certificateless ring signature scheme

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

To overcome the drawbacks such as high computational cost, unreasonable security model and long signature length in existing certificateless ring signature schemes, we propose an efficient certificateless ring signature scheme in this paper. Our construction is inspired by some efficient ID-based ring signature schemes, and uses bilinear pairings as a basic tool. Using a reasonable security model, the unforgeability of the proposed scheme is proven based on the intractability of the computational Diffie-Hellman (CDH) problem. The signature length of the new scheme is only |G 2|+n|G 1| (|G i | is the bit length of an element in group G i , i =1, 2). Compared with other existing certificateless ring signature schemes, the newly proposed scheme has a shorter signature length and is more efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Rivest R, Shamir A, Tauman Y. How to Leak a Secret [C]// Proc of Advances in Cryptology-Asiacrypt’ 01 (LNCS 2248). Berlin: Springer-Verlag, 2001: 552–565.

    Google Scholar 

  2. Shamir A. Identity Based Cyptosystems and Signature Schemes [C]//Proc of Advances in Cryptology-Crypto’84 (LNCS196). Berlin: Springer-Verlag, 1984: 47–53.

    Google Scholar 

  3. Zhang F, Kim K. ID-Based Blind Signature and Ring Signature from Pairings [C]//Proc of Advances in Cryptology-ASIACRYPT 2002(LNCS 2501). Berlin: Springer-Verlag, 2002: 533–547.

    Google Scholar 

  4. Boneh D, Franklin M. Identity Based Encryption from the Weil Pairing [EB/OL].[2007-07-25].http://eprint.iacr.org 2001/ 090.

  5. Chow S, Yiu S, Hui L C K. Efficient Identity Based Ring Signature [C]//Proc of Third International Conference(LNCS 3531). Berlin: Springer-Verlag, 2005: 499–512.

    Google Scholar 

  6. Al-Riyami S, Paterson K. Certificateless Public Key cryptography [EB/OL]. [2006-05-23]. http://springer.lib.tsinghua.edu.cn/content/4wc47elk7fp8xwty/fulltext.pdf.

  7. Chow S S M, Yap W S. Certificateless Ring Signatures [EB/OL]. [2008-03-22]. http://eprint.iacr.org/2007/236.pdf.

  8. Zhang F, Safavi-Naini R, Susilo W. An Efficient Signature Scheme from Bilinear Pairings and Its Applications [C]// Proc of PKC 2004(LNCS 2947). Berlin: Springer-Verlag, 2004: 277–290.

    Google Scholar 

  9. Zhang L, Zhang F, Wu W. A Provably Secure Ring Signature Scheme in Certificateless Cryptography[C]//Proc of ProvSec 2007 (LNCS 4784). Berlin: Springer-Verlag, 2007: 103–121.

    Google Scholar 

  10. Herranz J, Saez G. Forking Lemmas for Ring Signature Schemes [C]//Proc of Progress in Cryptology-INDOCRYPT 2003 (LNCS 2904). Berlin: Springer-Verlag, 2003: 266–279.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Futai Zhang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60673070) and the Natural Science Foundation of Jiangsu Province (BK2006217)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhu, L., Zhang, F. An efficient certificateless ring signature scheme. Wuhan Univ. J. Nat. Sci. 13, 567–571 (2008). https://doi.org/10.1007/s11859-008-0511-8

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-008-0511-8

Key words

CLC number

Navigation