...
首页> 外文期刊>Security and Communications Networks >Non-interactive deniable ring signature without random oracles
【24h】

Non-interactive deniable ring signature without random oracles

机译:非交互式可否定环签名,无随机预言

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Ring signature scheme protects the privacy while signer is signing. In the ring signature scheme, the signer can randomly choose verification keys of entities and generate a signature on behalf of these entities. The generated signature can be verified by anyone by inputting all these verification keys. Consequently, a ring signature convinces a verifier that one member from these entities produces this signature without revealing which one. This property is good for the signer as his identity is not leaked. However, the signer also can make use of this capacity to generate a malicious signature on behalf of a ring. Because of the unconditional anonymity of ring signature, this signer cannot be traced to be responsible for his malicious signing. Group signature can avoid this problem because the group manager in the group signature can trace the actual signer by using the trapdoor. However, the group is fixed from the beginning and it needs a complicated setup algorithm. Deniable ring signature was introduced by Komano et al., which allows to revoke the anonymity of actual signer without the manager's help if necessary. The actual signer can confirm his signing for anyone through the confirmation protocol. On the other hand, non-signers in the ring can disavow this signing by the disavowal protocol. Therefore, the actual signer can be traced. However, Komano's scheme was proven in random oracles, and the traceability protocols (confirmation and disavowal protocols) are interactive. To improve Komano's construction, this work proposes a new efficient non-interactive deniable ring signature scheme in the standard model. It is a kind of ring signature and therefore, it does not require a setup algorithm, and the ring in the scheme is flexible. Copyright (c) 2013 John Wiley & Sons, Ltd.
机译:环形签名方案可在签名者签名时保护隐私。在环形签名方案中,签名者可以随机选择实体的验证密钥并代表这些实体生成签名。任何人都可以通过输入所有这些验证密钥来验证生成的签名。因此,环签名使验证者确信,这些实体中的一个成员产生了该签名而没有透露哪个签名。此属性对签名者有利,因为签名者的身份不会泄漏。但是,签名者还可以利用此功能代表环生成恶意签名。由于环签名的无条件匿名性,因此无法跟踪此签名者对其恶意签名负责。组签名可以避免此问题,因为组签名中的组管理器可以通过使用陷门来跟踪实际的签名者。但是,该组从一开始就是固定的,并且需要复杂的设置算法。可拒绝的环签名是由Komano等人引入的,它允许在不需要管理者帮助的情况下撤销实际签名者的匿名性。实际签名者可以通过确认协议为任何人确认他的签名。另一方面,环中的非签名者可以通过拒绝协议来拒绝此签名。因此,可以跟踪实际的签名者。但是,Komano的方案已在随机预言机中得到证明,并且可追溯性协议(确认和拒绝协议)是交互式的。为了改善Komano的结构,这项工作提出了一种新的有效非交互可指定环签名方案。它是一种环签名,因此不需要设置算法,方案中的环是灵活的。版权所有(c)2013 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号