Abstract
In this paper, we propose a strong designated verifier ring signature scheme and discuss its security properties. The proposed scheme provides a way that leaks authoritative secrets to only a designated person anonymously by one of the group members and no one knows that the secret is from a group member or the recipient, except the recipient. This group is called a ring. We also propose a strong designated verifier ring signature with message recovery mechanism.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
M. Abe, M. Ohkubo, and K. Suzuki, “1-out-of-n signatures from a variety of keys,”Advances in Cryptology – ASIACRYPT 2002, LNCS 2501, pp. 415-432, 2001.
E. Bresson, J. Stern, and M. Szydlo, “Threshold ring signatures and applications to ad-hoc groups,” Advances in Cryptology – CRYPTO 2002, LNCS 2442, pp. 465-480, 2002.
S. Chow, S. Yiu, and L. Hui, “Efficient identity based ring signature,” Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings, LNCS 3531, pp.499-512, 2005.
S. Chow, K. Liu, K. Wei, and T. Yuen, “Ring signatures without random oracles,” Proceedings of AsicCCS 2006, pp. 297-302, 2006.
J. Herranz, and G. Saez, “Forking lemmas for ring signature schemes,” Indocrypt’03, LNCS 1403, pp. 406-421. 2003.
M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” Advances in Cryptology - EUROCRYPT ’96, LNCS 1070, pp. 143-154, 1996.
K. Nyberg, and R.A. Rueppel, “A new signature scheme based on the DSA giving message recovery,” Proceedings of the First ACM Conference on Computer and Communication Security, pp. 58-61, 1993.
K. Nyberg, and R.A. Rueppel, “Message recovery for signature schemes based on the discrete logarithm problem,” Advances in Cryptology - EUROCRYPT ’94. LNCS 950, pp. 182-193, 1994
R.L. Rivest, A. Shamir, and Y. Tauman, “How to leak a secret,” Advances in Cryptology – ASIACRYPT 2001, LNCS 2248, pp.257-265, 2001.
S. Saeednia, S. Kremer, and O. Markowitch, “An effcient strong designated verifier signature scheme,”Information Security and Cryptology - ICISC’03, LNCS 2971, pp. 40-54, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this paper
Cite this paper
Lee, JS., Chang, J.H. (2007). Strong Designated Verifier Ring Signature Scheme. In: Sobh, T. (eds) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6268-1_95
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6268-1_95
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6267-4
Online ISBN: 978-1-4020-6268-1
eBook Packages: EngineeringEngineering (R0)
