The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - Jan. (2014 vol.26)
pp: 157-165
Joseph K. Liu , Institute for Infocomm Research, Singapore
Man Ho Au , University of Wollongong, Wollongong
Willy Susilo , University of Wollongong, Wollongong
Jianying Zhou , Institute for Infocomm Research, Singapore
ABSTRACT
In this paper, we construct a linkable ring signature scheme with unconditional anonymity. It has been regarded as an open problem in [22] since 2004 for the construction of an unconditional anonymous linkable ring signature scheme. We are the first to solve this open problem by giving a concrete instantiation, which is proven secure in the random oracle model. Our construction is even more efficient than other schemes that can only provide computational anonymity. Simultaneously, our scheme can act as an counterexample to show that [19, Theorem 1] is not always true, which stated that linkable ring signature scheme cannot provide strong anonymity. Yet we prove that our scheme can achieve strong anonymity (under one of the interpretations).
INDEX TERMS
Public key, Games, Indexes, Electronic voting, Adaptive systems, Mathematical model,anonymity, Ring signature, linkable
CITATION
Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou, "Linkable Ring Signature with Unconditional Anonymity", IEEE Transactions on Knowledge & Data Engineering, vol.26, no. 1, pp. 157-165, Jan. 2014, doi:10.1109/TKDE.2013.17
REFERENCES
[1] M. Abe, M. Ohkubo, and K. Suzuki, "1-Out-of-n Signatures from a Variety of Keys," Proc. Eighth Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '02), pp. 415-432, 2002.
[2] N.R. Adam, "A New Dynamic Voting Algorithm for Distributed Database Systems," IEEE Trans. Knowledge and Data Eng., vol. 6, no. 3, pp. 470-478, June 1994.
[3] M.H. Au, S.S.M. Chow, W. Susilo, and P.P. Tsang, "Short Linkable Ring Signatures Revisited," Proc. Third European Conf. Public Key Infrastructure: Theory and Practice (EuroPKI '06), pp. 101-115, 2006.
[4] M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions," Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '03), pp. 614-629, 2003.
[5] D. Boneh and X. Boyen, "Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles," Proc. Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '04), pp. 223-238, 2004.
[6] D. Boneh and X. Boyen, "Secure Identity Based Encryption Without Random Oracles," Proc. 24th Ann. Int'l Cryptology Conf. (CRYPTO '04), pp. 443-459, 2004.
[7] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '03), pp. 416-432, 2003.
[8] J. Camenisch and M. Stadler, "Efficient Group Signature Schemes for Large Groups (Extended Abstract)," Proc. 17th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '97), pp. 410-424, 1997.
[9] D. Chaum and E. van Heyst, "Group Signatures," Proc. 10th Ann. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '91), pp. 257-265, 1991.
[10] L. Chen and T.P. Pedersen, "New Group Signature Schemes (Extended Abstract)," Proc. Workshop Theory and Application of Cryptographic Techniques (EUROCRYPT '94), pp. 171-181, 1994.
[11] L. Chen and N. Tokuda, "Stability Analysis of Regional and National Voting Schemes by a Continuous Model," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 1037-1042, July-Aug. 2003.
[12] S.S. Chow, J.K. Liu, V.K. Wei, and T.H. Yuen, "Ring Signatures without Random Oracles," Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '06), pp. 297-302, 2006.
[13] S.S.M. Chow, J.K. Liu, and D.S. Wong, "Robust Receipt-Free Election System with Ballot Secrecy and Verifiability," Proc. 16th Ann. Network and Distributed System Security Symp. (NDSS), 2008.
[14] S.S.M. Chow, S.-M. Yiu, and L.C.K. Hui, "Efficient Identity Based Ring Signature," Proc. Third Int'l Conf. Applied Cryptography and Network Security (ACNS '05), pp. 499-512, 2005.
[15] Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup, "Anonymous Identification in Ad Hoc Groups," Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '04), pp. 609-626, 2004.
[16] Q. Feng, Y.L. Sun, L. Liu, Y. Yang, and Y. Dai, "Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses," IEEE Trans. Knowledge and Data Eng., vol. 22, no. 12, pp. 1766-1780, Dec. 2010.
[17] E. Fujisaki, "Sub-Linear Size Traceable Ring Signatures Without Random Oracles," Proc. 11th Int'l Conf. Topics in Cryptology (CT-RSA '11), pp. 393-415, 2011.
[18] C. Gentry, "Practical Identity-Based Encryption Without Random Oracles," Proc. 24th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '06), pp. 445-464, 2006.
[19] I.R. Jeong, J.O. Kwon, and D.H. Lee, "Ring signature with Weak Linkability and Its Applications," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1145-1148, Aug. 2008.
[20] V. Kantere, D. Dash, G. François, S. Kyriakopoulou, and A. Ailamaki, "Optimal Service Pricing for a Cloud Cache," IEEE Trans. Knowledge and Data Eng., vol. 23, no. 9, pp. 1345-1358, Sept. 2011.
[21] J.K. Liu, V.K. Wei, and D.S. Wong, "A Separable Threshold Ring Signature Scheme," Proc. Sixth Int'l Conf. Information Security and Cryptology (ICISC '03), pp. 352-369, 2003.
[22] J.K. Liu, V.K. Wei, and D.S. Wong, "Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)," Proc. Ninth Australasian Conf. Information Security and Privacy (ACISP), 2004.
[23] J.K. Liu and D.S. Wong, "Linkable Ring Signatures: Security Models and New Schemes," Proc. Int'l Conf. Computational Science and Its Applications (ICCSA '05), pp. 614-623, 2005.
[24] J.K. Liu, T.H. Yuen, and J. Zhou, "Forward Secure Ring Signature Without Random Oracles," Proc. 13th Int'l Conf. Information and Comm. Security (ICICS '11), pp. 1-14, 2011.
[25] S. Meng, L. Liu, and T. Wang, "State Monitoring in Cloud Datacenters," IEEE Trans. Knowledge and Data Eng., vol. 23, no. 9, pp. 1328-1344, Sept. 2011.
[26] D. Pointcheval and J. Stern, "Security Proofs for Signature Schemes," Proc. 15th Ann. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT '96), pp. 387-398, 1996.
[27] R.L. Rivest, A. Shamir, and Y. Tauman, "How to Leak a Secret," Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '01), pp. 552-565, 2001.
[28] H. Shacham and B. Waters, "Efficient Ring Signatures Without Random Oracles," Proc. 10th Int'l Conf. Practice and Theory in Public-Key Cryptography (PKC '07), pp. 166-180, 2007.
[29] P.P. Tsang, M.H. Au, J.K. Liu, W. Susilo, and D.S. Wong, "A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity," Proc. Fourth Int'l Conf. Provable Security (ProvSec '10), pp. 166-183, 2010.
[30] P.P. Tsang and V.K. Wei, "Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation," Proc. First Int'l Conf. Information Security Practice and Experience (ISPEC '05), pp. 48-60, 2005.
[31] P.P. Tsang, V.K. Wei, T.K. Chan, M.H. Au, J.K. Liu, and D.S. Wong, "Separable Linkable Threshold Ring Signatures," Proc. Fifth Int'l Conf. Cryptology in India (INDOCRYPT '04), pp. 384-398, 2004.
[32] C. Wang, K. Ren, W. Lou, and J. Li, "Toward Publicly Auditable Secure Cloud Data Storage Services," IEEE Network, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
[33] B. Waters, "Efficient Identity-Based Encryption Without Random Oracles," Proc. 24th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '05), pp. 114-127, 2005.
[34] D.S. Wong, K. Fung, J.K. Liu, and V.K. Wei, "On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST," Proc. Fifth Int'l Conf. Information and Comm. Security (ICICS '03), pp. 34-46, 2003.
[35] T.H. Yuen, J.K. Liu, M.H. Au, W. Susilo, and J. Zhou, "Threshold Ring Signatures Without Random Oracles," Proc. Sixth ACM Symp. Information, Computer and Comm. Security (ASIACCS '11), pp. 261-267, 2011.
[36] T.H. Yuen, J.K. Liu, M.H. Au, W. Susilo, and J. Zhou, "Efficient Linkable and/or Threshold Ring Signature Without Random Oracles," Computer J., vol. 56, no. 4, pp. 407-421, 2013.
[37] F. Zhang and K. Kim, "ID-Based Blind Signature and Ring Signature from Pairings," Proc. Eighth Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '02), pp. 533-547, 2002.
[38] D. Zheng, X. Li, K. Chen, and J. Li, "Linkable Ring Signatures from Linear Feedback Shift Register," Proc. Conf. Emerging Direction in Embedded and Ubiquitous Computing (EUC '07), pp. 716-727, 2007.
[39] L. Zhou, V. Varadharajan, and M. Hitchens, "Enforcing Role-Based Access Control for Secure Data Storage in the Cloud," Comput. J., vol. 54, no. 10, pp. 1675-1687, 2011.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool