Threshold Ring Signature Scheme Based on the Curve (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
スポンサーリンク
概要
- 論文の詳細を見る
Rivest, Shamir, and Tauman have proposed the ring signature scheme, which makes it possible to specify a group without revealing which member signed a message. Bresson, Stern, and Szydlo have shown a (k, n) threshold ring signature scheme. It is possible to convince a verifier that at least k members in the n-member group signed a message without revealing which k members signed the message. In this paper, we propose a new (k, n) threshold ring signature, scheme. While the previous schemes form a ring of individual signatures, our scheme forms a curve of individual signatures. Our scheme is more efficient than the scheme shown by Bresson, et al. Moreover, we show that ElGamal's signature scheme, which is hot based on the trapdoor one-way permutation, is available in the threshold ring signature.
- 一般社団法人情報処理学会の論文
- 2003-08-15
著者
-
Tanaka Hatsukazu
Kobe University
-
Tanaka Hatsukazu
Kobe Institute Of Computing
-
Kuwakado H
Kobe Univ. Kobe‐shi Jpn
-
Kuwakado Hidenori
Kobe University
関連論文
- Reversible Watermark with Large Capacity Based on the Prediction Error Expansion
- Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer(Cryptography,Information Theory and Its Applications)
- Reversible Watermark with Large Capacity Based on the Prediction Error
- Collusion-Attack Free ID-Based Non-interactive Key Sharing(Information Security)
- Threshold Ring Signature Scheme Based on the Curve (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
- Fingerprinting Protocol for On-Line Trade Using Information Gap between Buyer and Merchant
- Secure Length-Preserving All-or-Nothing Transform (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Visual Commitment Using the Trusted Initializer
- Secure Length-Preserving All-or-Nothing Transform
- Secure Length-Preserving All-or-Nothing Transform
- Length-preserving CBC Enciphering Scheme and Its Security Analysis
- Length-preserving CBC Enciphering Scheme and Its Security Analysis