Paper Title:
ID-Based Deniable Ring Signature with Constant-Size Signature
  Abstract

The ring signature can guarantee the signer’s anonymity. Most proposed ring signature schemes have two problems: One is that the size of ring signature depends linearly on the ring size, and the other is that the signer can shift the blame to victims because of the anonymity. Some authors have studied the constant-size ring signature and deniable ring signature to solve these two problems. This paper shows that an identity-based ring signature scheme with constant size has some security problems by using an insecure accumulator and its verification process does not include the message m. Then we combine the concepts of “constant-size” and “deniable” to form an id-based deniable ring signature with constant-size signature. The new scheme with constant-size signature length is proposed based on an improved accumulator from bilinear pairings and it solves the problem of anonymity abuse.

  Info
Periodical
Advanced Materials Research (Volumes 255-260)
Edited by
Jingying Zhao
Pages
2192-2196
DOI
10.4028/www.scientific.net/AMR.255-260.2192
Citation
C. Y. Hu, P. T. Liu, "ID-Based Deniable Ring Signature with Constant-Size Signature", Advanced Materials Research, Vols. 255-260, pp. 2192-2196, 2011
Online since
May 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Li Jun Zhao, Guo Jun Li, Ji Hai Jiang
Abstract:According to the running characteristic of an aircraft tractor and the specificity of serve target, the hybrid hydraulic system program is...
4403
Authors: Lin Li, Hai Tao Shi, Xin Gang Wang
Abstract:Flow regime recognition of two-phase flow is of great importance in industrial process. This paper describes the role of the...
2066
Authors: Hu Dai Fu, Hua Wang, Jin Gang Gao
Chapter 10: Machine Vision
Abstract:In the automatic production, the application of machine vision technology on image pattern recognition is an important task. Realistic image...
1385
Authors: Meng Li Wu, Jia Bin Yuan
Chapter 1: Mechanical Engineering
Abstract:Two methods are proposed in the paper to reduce the flow and pressure pulsation caused by the reciprocating pump in aircraft deicing system....
104
Authors: Shu Lan Wang, Jian Ping Yu, Peng Zhang, Ping Wang
Chapter 6: Computer Science, Networks, Communication, Software, Information Security and Technologies
Abstract:Attribute-based encryption (ABE) can keep data privacy and realize fine-grained access control. However, the notion of file hierarchy hasn't...
911