The Community for Technology Leaders
RSS Icon
Issue No.08 - August (2008 vol.20)
pp: 1145-1148
We suggest a linkable ring signature scheme providing strong anonymity and weak linkability. We show that our linkable ring signature scheme can be used to construct a selectively linkable ring signature scheme, an efficient convertible (verifiable) ring signature scheme, and an efficient deductible ring signature scheme.
Security and Privacy Protection, Public key cryptosystems
Jeong Ok Kwon, Ik Rae Jeong, "Ring Signature with Weak Linkability and Its Applications", IEEE Transactions on Knowledge & Data Engineering, vol.20, no. 8, pp. 1145-1148, August 2008, doi:10.1109/TKDE.2008.19
[1] M.H. Au, S.S.M. Chow, W. Susilo, and P.P. Tsang, “Short Linkable Ring Signatures Revisited,” Proc. Third European PKI Workshop: Theory and Practice (EuroPKI '06), pp. 101-115, 2006.
[2] M.H. Au, J.K. Liu, W. Susilo, and T.H. Yuen, “Constant-Size ID-Based Linkable and Revocable-Iff-Linked Ring Signature,” Proc. Int'l Conf. Cryptology in India (INDOCRYPT '06), pp. 364-378, 2006.
[3] L. Chen and T.P. Pedersen, “New Group Signature Schemes,” Proc. Workshop Theory and Application of Cryptographic Techniques (EUROCRYPT '94), pp. 171-181, 1994.
[4] J. Camenisch and M. Stadler, “Efficient Group Signature Scheme for Large Groups,” Proc. 17th Ann. Int'l Cryptology Conf. (CRYPTO '97), pp. 410-424, 1997.
[5] J.K. Liu and D.S. Wong, “Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature,” Int'l J. Foundations of Computer Science, vol. 17, no. 6, pp. 1403-1422, Dec. 2006.
[6] J.K. Liu, V.K. Wei, and D.S. Wong, “Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups,” Proc. Ninth Australasian Conf. Information Security and Privacy (ACISP '04), pp. 325-335, 2004.
[7] J. Lv and X. Wang, “Verifiable Ring Signature,” Proc. Ninth Int'l Conf. Distributed Multimedia Systems (DMS '03), pp. 663-667, 2003.
[8] D. Pointcheval and J. Stern, “Security Arguments for Digital Signatures and Blind Signatures,” J. Cryptology, vol. 13, no. 3, pp. 361-396, 2000.
[9] R.L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret,” Proc. Advances in Cryptology, Seventh Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT '01), pp. 552-565, 2001.
[10] P.P. Tsang and V.K. Wei, “Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation,” Proc. First Information Security Practice and Experience Conf. (ISPEC '05), pp. 48-60, 2005.
[11] P.P. Tsang, V.K. Wei, T.K. Chan, M.H. Au, J.K. Liu, and D.S. Wong, “Separable Linkable Threshold Ring Signatures,” Proc. Int'l Conf. Cryptology in India (INDOCRYPT '04), pp. 384-398, 2004.
[12] D. Zheng, V.K. Wei, and K.F. Chen, “GDH Group-Based Signature Scheme with Linkability,” IEE Proc. Comm., vol. 153, no. 5, pp. 639-644, Oct. 2006.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool