Sciweavers

Share
ICISC
2004

Identity Based Threshold Ring Signature

10 years 28 days ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we present an identity based (ID-based) threshold ring signature scheme. The scheme is provably secure in the random oracle model and provides trusted authority compatibility. To the best of authors' knowledge, our scheme is the first ID-based threshold ring signature scheme which is also the most efficient (in terms of number of pairing operations required) IDbased ring signature scheme (when t = 1) and threshold ring signature scheme from pairings.
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming
Added 31 Oct 2010
Updated 31 Oct 2010
Type Conference
Year 2004
Where ICISC
Authors Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
Comments (0)
books