Skip to main content

Strong Designated Verifier Ring Signature Scheme

  • Conference paper

Abstract

In this paper, we propose a strong designated verifier ring signature scheme and discuss its security properties. The proposed scheme provides a way that leaks authoritative secrets to only a designated person anonymously by one of the group members and no one knows that the secret is from a group member or the recipient, except the recipient. This group is called a ring. We also propose a strong designated verifier ring signature with message recovery mechanism.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abe, M. Ohkubo, and K. Suzuki, “1-out-of-n signatures from a variety of keys,”Advances in Cryptology – ASIACRYPT 2002, LNCS 2501, pp. 415-432, 2001.

    Google Scholar 

  2. E. Bresson, J. Stern, and M. Szydlo, “Threshold ring signatures and applications to ad-hoc groups,” Advances in Cryptology – CRYPTO 2002, LNCS 2442, pp. 465-480, 2002.

    Google Scholar 

  3. S. Chow, S. Yiu, and L. Hui, “Efficient identity based ring signature,” Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings, LNCS 3531, pp.499-512, 2005.

    Google Scholar 

  4. S. Chow, K. Liu, K. Wei, and T. Yuen, “Ring signatures without random oracles,” Proceedings of AsicCCS 2006, pp. 297-302, 2006.

    Google Scholar 

  5. J. Herranz, and G. Saez, “Forking lemmas for ring signature schemes,” Indocrypt’03, LNCS 1403, pp. 406-421. 2003.

    Google Scholar 

  6. M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” Advances in Cryptology - EUROCRYPT ’96, LNCS 1070, pp. 143-154, 1996.

    Google Scholar 

  7. K. Nyberg, and R.A. Rueppel, “A new signature scheme based on the DSA giving message recovery,” Proceedings of the First ACM Conference on Computer and Communication Security, pp. 58-61, 1993.

    Google Scholar 

  8. K. Nyberg, and R.A. Rueppel, “Message recovery for signature schemes based on the discrete logarithm problem,” Advances in Cryptology - EUROCRYPT ’94. LNCS 950, pp. 182-193, 1994

    Google Scholar 

  9. R.L. Rivest, A. Shamir, and Y. Tauman, “How to leak a secret,” Advances in Cryptology – ASIACRYPT 2001, LNCS 2248, pp.257-265, 2001.

    Google Scholar 

  10. S. Saeednia, S. Kremer, and O. Markowitch, “An effcient strong designated verifier signature scheme,”Information Security and Cryptology - ICISC’03, LNCS 2971, pp. 40-54, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer

About this paper

Cite this paper

Lee, JS., Chang, J.H. (2007). Strong Designated Verifier Ring Signature Scheme. In: Sobh, T. (eds) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6268-1_95

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-6268-1_95

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-6267-4

  • Online ISBN: 978-1-4020-6268-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics