This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Ring Signature with Weak Linkability and Its Applications
August 2008 (vol. 20 no. 8)
pp. 1145-1148
We suggest a linkable ring signature scheme providing strong anonymity and weak linkability. We show that our linkable ring signature scheme can be used to construct a selectively linkable ring signature scheme, an efficient convertible (verifiable) ring signature scheme, and an efficient deductible ring signature scheme.

[1] M.H. Au, S.S.M. Chow, W. Susilo, and P.P. Tsang, “Short Linkable Ring Signatures Revisited,” Proc. Third European PKI Workshop: Theory and Practice (EuroPKI '06), pp. 101-115, 2006.
[2] M.H. Au, J.K. Liu, W. Susilo, and T.H. Yuen, “Constant-Size ID-Based Linkable and Revocable-Iff-Linked Ring Signature,” Proc. Int'l Conf. Cryptology in India (INDOCRYPT '06), pp. 364-378, 2006.
[3] L. Chen and T.P. Pedersen, “New Group Signature Schemes,” Proc. Workshop Theory and Application of Cryptographic Techniques (EUROCRYPT '94), pp. 171-181, 1994.
[4] J. Camenisch and M. Stadler, “Efficient Group Signature Scheme for Large Groups,” Proc. 17th Ann. Int'l Cryptology Conf. (CRYPTO '97), pp. 410-424, 1997.
[5] J.K. Liu and D.S. Wong, “Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature,” Int'l J. Foundations of Computer Science, vol. 17, no. 6, pp. 1403-1422, Dec. 2006.
[6] J.K. Liu, V.K. Wei, and D.S. Wong, “Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups,” Proc. Ninth Australasian Conf. Information Security and Privacy (ACISP '04), pp. 325-335, 2004.
[7] J. Lv and X. Wang, “Verifiable Ring Signature,” Proc. Ninth Int'l Conf. Distributed Multimedia Systems (DMS '03), pp. 663-667, 2003.
[8] D. Pointcheval and J. Stern, “Security Arguments for Digital Signatures and Blind Signatures,” J. Cryptology, vol. 13, no. 3, pp. 361-396, 2000.
[9] R.L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret,” Proc. Advances in Cryptology, Seventh Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT '01), pp. 552-565, 2001.
[10] P.P. Tsang and V.K. Wei, “Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation,” Proc. First Information Security Practice and Experience Conf. (ISPEC '05), pp. 48-60, 2005.
[11] P.P. Tsang, V.K. Wei, T.K. Chan, M.H. Au, J.K. Liu, and D.S. Wong, “Separable Linkable Threshold Ring Signatures,” Proc. Int'l Conf. Cryptology in India (INDOCRYPT '04), pp. 384-398, 2004.
[12] D. Zheng, V.K. Wei, and K.F. Chen, “GDH Group-Based Signature Scheme with Linkability,” IEE Proc. Comm., vol. 153, no. 5, pp. 639-644, Oct. 2006.

Index Terms:
Security and Privacy Protection, Public key cryptosystems
Citation:
Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee, "Ring Signature with Weak Linkability and Its Applications," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1145-1148, Aug. 2008, doi:10.1109/TKDE.2008.19
Usage of this product signifies your acceptance of the Terms of Use.