Traceable Ring Signature
スポンサーリンク
概要
- 論文の詳細を見る
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No group manager, no special setup, and the dynamics of group choice. The ring signature is, however, vulnerable to malicious or irresponsible signers in some applications, because of its anonymity. In this paper, we propose a traceable ring signature scheme. A traceable ring scheme is a ring signature except that it can restrict “excessive” anonymity. The traceable ring signature has a tag that consists of a list of ring members and an issue that refers to, for instance, a social affair or an election. A ring member can make any signed but anonymous opinion regarding the issue, but only once (per tag). If the member submits another signed opinion, possibly pretending to be another person who supports the first opinion, the identity of the member is immediately revealed. If the member submits the same opinion, for instance, voting “yes” regarding the same issue twice, everyone can see that these two are linked. The traceable ring signature can suit to many applications, such as an anonymous voting on a BBS. We formalize the security definitions for this primitive and show an efficient and simple construction in the random oracle model.
- (社)電子情報通信学会の論文
- 2008-01-01
著者
-
FUJISAKI Eiichiro
NTT Information Sharing Platform Laboratories, NTT Corporation
-
Suzuki Koutarou
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Fujisaki Eiichiro
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Fujisaki Eiichiro
Ntt Information Sharing Platform Laboratories Ntt Corp.
関連論文
- Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications(Protocols,Cryptography and Information Security)
- Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation(Application)(Cryptography and Information Security)
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
- Traceable Ring Signature
- M+1-st Price Auction Using Homomorphic Encryption(Special Section on Cryptography and Information Security)
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
- A Multi-Trapdoor Commitment Scheme from the RSA Assumption
- Strongly Secure Predicate-Based Authenticated Key Exchange : Definition and Constructions
- An Efficient Non-interactive Universally Composable String-Commitment Scheme
- Security of ESIGN-PSS(Information Security)
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange