Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Public Key Cryptography

PKC 2007: Public Key Cryptography – PKC 2007 pp 31–42Cite as

  1. Home
  2. Public Key Cryptography – PKC 2007
  3. Conference paper
Anonymous Signatures Made Easy

Anonymous Signatures Made Easy

  • Marc Fischlin1 
  • Conference paper
  • 2025 Accesses

  • 11 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4450)

Abstract

At PKC 2006, Yang, Wong, Deng and Wang proposed the notion of anonymous signature schemes where signatures do not reveal the signer’s identity, as long as some parts of the message are unknown. They also show how to modify the RSA scheme and the Schnorr scheme to derive anonymous signatures in the random oracle model. Here we present a general and yet very efficient approach to build such anonymous schemes from ordinary signature schemes. When instantiated in the random oracle model, our solution is essentially as efficient as the original scheme, whereas our construction also supports an almost as efficient instantiation in the standard model.

Keywords

  • Anonymity
  • perfectly one-way hash function
  • randomness extractor
  • signature scheme

Chapter PDF

Download to read the full chapter text

References

  1. Bender, A., Katz, J., Morselli, R.: Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. Theory of Cryptography Conference (TCC) 2006. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 60–79. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  2. Canetti, R.: Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. Advances in Cryptology—Crypto’97. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455–469. Springer, Heidelberg (1997)

    Google Scholar 

  3. Canetti, R., Micciancio, D., Reingold, O.: Perfectly One-Way Probabilistic Hash Functions. In: Proceedings of the Annual Symposium on the Theory of Computing (STOC)’98, pp. 131–140. ACM Press, New York (1998)

    Google Scholar 

  4. Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous Identification in Ad Hoc Groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 609–626. Springer, Heidelberg (2004)

    Google Scholar 

  5. Nisan, N., Ta-Shma, A.: Extracting Randomness: A Survey and New Constructions. Journal of Computer and System Science 58(1), 148–173 (1999)

    CrossRef  MATH  MathSciNet  Google Scholar 

  6. Nisan, N., Zuckerman, D.: Randomness is Linear in Space. Journal of Computer and System Science 52(1), 43–52 (1996)

    CrossRef  MATH  MathSciNet  Google Scholar 

  7. Rivest, R., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  8. Shaltiel, R.: Recent Developments in Extractors — a Survey. Bulletin of the European Association for Theoretical Computer Science 77, 67–95 (2002)

    MATH  MathSciNet  Google Scholar 

  9. Yang, G., Wong, D., Deng, X., Wang, H.: Anonymous Signature Schemes. Public-Key Cryptography (PKC) 2006. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 347–363. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Darmstadt University of Technology, Germany

    Marc Fischlin

Authors
  1. Marc Fischlin
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Tatsuaki Okamoto Xiaoyun Wang

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Fischlin, M. (2007). Anonymous Signatures Made Easy. In: Okamoto, T., Wang, X. (eds) Public Key Cryptography – PKC 2007. PKC 2007. Lecture Notes in Computer Science, vol 4450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71677-8_3

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-71677-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71676-1

  • Online ISBN: 978-3-540-71677-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature