Advertisement

On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST

  • Duncan S. Wong
  • Karyin Fung
  • Joseph K. Liu
  • Victor K. Wei
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2836)

Abstract

We propose a Reed-Solomon (RS) code construction of the 1-out-n (ring) signature scheme. It is obtained from the observation of the equivalency between the erasure correction technique of the RS code and the polynomial interpolation. The structure is very simple and yields a ring equation that can appropriately denoted by Z 1 + ... + Z n =v, which represents the summation of n evaluations of a polynomial. We also show how to extend the generic RST scheme [6] to a t-out-n threshold ring signature scheme.

Keywords

Signature Schemes Coding Theory 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n signatures from a variety of keys. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 415–432. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)CrossRefGoogle Scholar
  3. 3.
    Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures for ad-hoc groups. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 465–480. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. SIAM J. Applied Math. 8, 300–304 (1960)zbMATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Wei, V.K.: Modulation, Coding and Cryptography: Theory, Algorithms and Source programs. Draft (1998)Google Scholar
  8. 8.
    Zhang, F., Kim, K.: ID-Based blind signature and ring signature from pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Duncan S. Wong
    • 1
  • Karyin Fung
    • 1
  • Joseph K. Liu
    • 1
  • Victor K. Wei
    • 1
  1. 1.Department of Information EngineeringThe Chinese University of Hong KongHong KongChina

Personalised recommendations