Analysis and Attack of Two Ring Signature Schemes

Article Preview

Abstract:

A ring signature scheme enables a signer, in an ad-hoc manner, to sign a signature on behalf of a group of users including himself such that a verifier can be convinced that one of the identified users actually generated the signature but he can not identify the signer. In this paper, we analyse and attack two ring signature related schemes, including a ring signature scheme and a ring signcryption scheme, we prove that they can not satisfy the property of unconditional anonymity, and are all insecure.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 468-471)

Pages:

382-385

Citation:

Online since:

February 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R.Rivest, A.Shamir, Y.Tauman. How to Leak a Secret[A]. In Lecture Notes in Computer Science[C], Berlin:Springer-Verlag,2001,2248,552-565.

DOI: 10.1007/3-540-45682-1_32

Google Scholar

[2] Javier Herranz, German Saez. Forking Lemmas for Ring Signature Schemes,INDOCRYPT 2003,LNCS 2904,Springer-Verlag:266-279,2003.

DOI: 10.1007/978-3-540-24582-7_20

Google Scholar

[3] Chandana Gamage, Ben Gras, Bruno Crispo and Andrew S Tanenbaum. An identity-based ring signature scheme with enhanced privacy. Proc Securecomm and Workshops, 2006:1-5.

DOI: 10.1109/seccomw.2006.359554

Google Scholar

[4] Sherman S.M. Chow, Siu-Ming Yiu, and Lucas Chi Kwong Hui. Efficient identity based ring signature. In ACNS,2005:499-512.

Google Scholar

[5] Fagen Li, Hu Xiong, and Yong Yu. An efficient id-based ring signcryption scheme.In International Conference on Communications, Circuits and Systems - 2008. ICCCAS 2008,pp:483–487. IEEE,2008.

DOI: 10.1109/icccas.2008.4657819

Google Scholar

[6] Adam Bender, Jonathan Katz, and Ruggero Morselli. Ring signatures: Stronger definitions, and constructions without random oracles. In TCC, volume 3876 of Lecture Notes in Computer Science, pp: 60-79. Springer,2006.

DOI: 10.1007/11681878_4

Google Scholar

[7] Emmanuel Bresson, Jacque Stern, Michael Szydlo. Threshold Ring Signatures and Applications to Ad-Hoc Groups(Extended abstract) [A].Lecture Notes in Computer Science [C] , Berlin: Springer-Verlag,2002, 2442:465-480.

DOI: 10.1007/3-540-45708-9_30

Google Scholar

[8] Sherman S.M.Chow,Lucas C.K.Hui and S.M.Yiu.Identity Based Threshold Ring Signature[A]. In ICISC 2004,Lecture Notes in Computer Science [C] , Berlin : Springer – Verlag, 2005,3506:218-232.

Google Scholar