Step-Out Ring Signatures

  • Marek Klonowski
  • Łukasz Krzywiecki
  • Mirosław Kutyłowski
  • Anna Lauks
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5162)

Abstract

We propose a version of ring signatures for which the set of potential signers may be reduced: the real signer can prove that he or she has created the signature, while every other member of the ring can prove not to be the signer. Possibility to run these protocols is triggered by publishing certain secret information. The proposed scheme is an intermediate solution between the classical ring and group signatures, and can be used for instance for e-auction schemes.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248. pp. 552–556. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)CrossRefGoogle Scholar
  3. 3.
    Manulis, M.: Democratic Group Signatures: on an Example of Joint Ventures. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, p. 365. ACM Press, New York (2006)CrossRefGoogle Scholar
  4. 4.
    Naor, M.: Deniable Ring Authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 481–498. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Susilo, W., Mu, Y.: Deniable Ring Authentication Revisited. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 149–163. Springer, Heidelberg (2004)Google Scholar
  6. 6.
    Wei, V.K., Tsang, P.P.: Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 48–60. Springer, Heidelberg (2005)Google Scholar
  7. 7.
    Au, M.H., Chow, S.S.M., Susilo, W., Tsang, P.P.: Short Linkable Ring Signatures Revisited. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 101–115. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  8. 8.
    Zhang, F., Kim, K.: ID-Based Blind Signature and Ring Signature from Pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Herranz, J., Sáez, G.: A Provably Secure Id-based Ring Signature Scheme. Cryptology ePrint Archive, Report 2003/261 (2003), http://eprint.iacr.org/
  10. 10.
    Lin, C.Y., Wu, T.C.: An Identity-based Ring Signature Scheme from Bilinear Pairings. Cryptology ePrint Archive, Report 2003/117 (2003), http://eprint.iacr.org/
  11. 11.
    Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient Identity Based Ring Signature. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 499–512. Springer, Heidelberg (2005)Google Scholar
  12. 12.
    Awasthi, A.K., Lal, S.: ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. ArXiv Computer Science e-prints (2005), http://arxiv.org/abs/cs/0504097
  13. 13.
    Au, M.H., Liu, J.K., Yuen, T.H., Wong, D.S.: Id-based Ring Signature Scheme Secure in the Standard Model. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 1–16. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Chen, Y.S., Lei, C.L., Chiu, Y.P., Huang, C.Y.: Confessible Threshold Ring Signatures. In: International Conference on Systems and Networks Communications (ICNSC). IEEE Computer Society, Los Alamitos (2006), http://doi.ieeecomputersociety.org/10.1109/ICSNC.2006.29 Google Scholar
  15. 15.
    Komano, Y., Ohta, K., Shimbo, A., Ichi Kawamura, S.: Toward the Fair Anonymous Signatures: Deniable Ring Signatures. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 174–191. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Mu, Y., Susilo, W., Zhang, F., Wu, Q.: Ad Hoc Group Signatures. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 120–135. Springer, Heidelberg (2006)Google Scholar
  17. 17.
    Camenisch, J.L.: Efficient and Generalized Group Signatures. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 465–479. Springer, Heidelberg (1997)Google Scholar
  18. 18.
    Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. J. Cryptology 13(3), 361–396 (2000)MATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Marek Klonowski
    • 1
  • Łukasz Krzywiecki
    • 1
  • Mirosław Kutyłowski
    • 1
  • Anna Lauks
    • 1
  1. 1.Institute of Mathematics and Computer ScienceWrocław University of Technology 

Personalised recommendations