메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 297-302

Ring signatures without random oracles

Author keywords

Bilinear pairings; Random oracle model; Ring signature

Indexed keywords

AUTHENTICATION; COMPUTATIONAL METHODS; COMPUTER CRIME; COMPUTER OPERATING SYSTEMS; SECURITY OF DATA;

EID: 33845246483     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1128817.1128861     Document Type: Conference Paper
Times cited : (81)

References (25)
  • 1
    • 84958744427 scopus 로고    scopus 로고
    • 1-out-of-n Signatures from a Variety of Keys
    • Y. Zheng, editor, Advances in Cryptology, ASIA CRYPT 2002, Proceedings, of, Springer
    • M. Abe, M. Ohkubo, and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. In Y. Zheng, editor, Advances in Cryptology - ASIA CRYPT 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 415-432. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 415-432
    • Abe, M.1    Ohkubo, M.2    Suzuki, K.3
  • 2
    • 35048832490 scopus 로고    scopus 로고
    • An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
    • C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, Proceedings, of, Springer
    • M. Bellare, A. Boldyreva, and A. Palacio. An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 171-188. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 3
    • 35248843604 scopus 로고    scopus 로고
    • Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions
    • E. Biham, editor, Advanaes in Cryptology, EUROCRYPT 2003, Proceedings, of, Springer
    • M. Bellare, D. Micciancio, and B. Warinschi. Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. In E. Biham, editor, Advanaes in Cryptology - EUROCRYPT 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 614-629. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 614-629
    • Bellare, M.1    Micciancio, D.2    Warinschi, B.3
  • 5
    • 38049081423 scopus 로고    scopus 로고
    • Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. To appear in TCC 06. Cryptology ePrint Archive
    • Report 2005/304
    • A. Bender, J. Katz, arid R. Morselli. Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. To appear in TCC 06. Cryptology ePrint Archive, Report 2005/304, 2005.
    • (2005)
    • Bender, A.1    Katz, J.2    arid, R.3    Morselli4
  • 6
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • C. Cachin and J. Camenisch, editors, Advances in Cryptology, EUROCRYPT 2004, Proceedings, of, Springer
    • D. Boneh and X. Boyen. Short signatures without random oracles. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 56-73. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 7
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
    • E. Biham, editor, Advances in Cryptology, EUROCRYPT 2003, Proceedings, of, Springer
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In E. Biham, editor, Advances in Cryptology - EUROCRYPT 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 416-432. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 8
    • 84946840347 scopus 로고    scopus 로고
    • Short Signat-ures from the Weil Pairing
    • C. Boyd, editor, Advances in Cryptology, ASIACRYPT 2001, Proceedings, of, Springer
    • D. Boneh, B. Lynn, and H. Shacham. Short Signat-ures from the Weil Pairing. In C. Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 9
    • 84937420077 scopus 로고    scopus 로고
    • Threshold Ring Signatures arid Applications to Ad-hoc Groups
    • M. Yurig, editor, Advances in Cryptology, CRYPTO 2002, Proceedings, of, Springer
    • E. Bresson, J. Stern, and M. Szydlo. Threshold Ring Signatures arid Applications to Ad-hoc Groups. In M. Yurig, editor, Advances in Cryptology - CRYPTO 2002, Proceedings, volume 2442 of Lecture Notes in Computer Science, pages 465-480. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 465-480
    • Bresson, E.1    Stern, J.2    Szydlo, M.3
  • 10
    • 84958612917 scopus 로고    scopus 로고
    • J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97, Proceedings, 1294 of Lecture Notes in Computer Science, pages 410-424. Springer, 1997.
    • J. Camenisch and M. Stadler. Efficient Group Signature Schemes for Large Groups (Extended Abstract). In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97, Proceedings, volume 1294 of Lecture Notes in Computer Science, pages 410-424. Springer, 1997.
  • 11
    • 0031619016 scopus 로고    scopus 로고
    • The Random Oracle Methodology, Revisited
    • R. Canetti, O. Goldreich, arid S. Halevi. The Random Oracle Methodology, Revisited. In STOC, pages 209-218, 1998.
    • (1998) STOC , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    arid, S.3    Halevi4
  • 12
    • 85024290278 scopus 로고
    • Group signatures
    • D. W. Davies, editor, Advances in Cryptology, EUROCRYPT '91, Proceedings, of, Springer
    • D. Chaum and E. van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, Proceedings, volume 547 of Lecture Notes in Computer Science, pages 257-265. Springer, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 257-265
    • Chaum, D.1    van Heyst, E.2
  • 13
    • 24944525692 scopus 로고    scopus 로고
    • S. Chow, L. Hui, and S. Yiu. Identity Based Threshold Ring Signature. In Information Security and Cryptology - ICISC 2004, Revised Papers, 3506 of Lecture Notes in Computer Science, pages 218-232, Seoul, Korea, 2004. Springer-Verlag. Also available at Cryptology ePrint Archive, Report 2004/179.
    • S. Chow, L. Hui, and S. Yiu. Identity Based Threshold Ring Signature. In Information Security and Cryptology - ICISC 2004, Revised Papers, volume 3506 of Lecture Notes in Computer Science, pages 218-232, Seoul, Korea, 2004. Springer-Verlag. Also available at Cryptology ePrint Archive, Report 2004/179.
  • 14
    • 26444540788 scopus 로고    scopus 로고
    • S. Chow, S. Yiu, and L. Hui. Efficient Identity Based Ring Signature . In Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings, 3531 of Lecture Notes in Computer Science, pages 499-512. Springer-Verlag, 2005. Also available at Cryptology ePrint Archive, Report 2004/327.
    • S. Chow, S. Yiu, and L. Hui. Efficient Identity Based Ring Signature . In Applied Cryptography and Network Security, Third International Conference, ACNS 2005, Proceedings, volume 3531 of Lecture Notes in Computer Science, pages 499-512. Springer-Verlag, 2005. Also available at Cryptology ePrint Archive, Report 2004/327.
  • 15
    • 85016672373 scopus 로고
    • Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
    • Y. Desmedt, editor, Advances in Cryptology, CRYPTO '94, Proceedings, of, Springer
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Y. Desmedt, editor, Advances in Cryptology - CRYPTO '94, Proceedings, volume 839 of Lecture Notes in Computer Science, pages 174-187. Springer, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 16
    • 35048854233 scopus 로고    scopus 로고
    • Anonymous Identification in Ad Hoc Groups
    • C. Cachin and J. Cameriisch, editors, Advances in Cryptology, EUROCRYPT 2004, Proceedings, of, Springer
    • Y. Dodis, A. Kiayias, A. Nicolosi, and V. Shoup. Anonymous Identification in Ad Hoc Groups. In C. Cachin and J. Cameriisch, editors, Advances in Cryptology - EUROCRYPT 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 609-626. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 609-626
    • Dodis, Y.1    Kiayias, A.2    Nicolosi, A.3    Shoup, V.4
  • 17
    • 34748860016 scopus 로고    scopus 로고
    • Perfect Non-Interactive Zero Knowledge for NP. Cryptology ePrint Archive
    • Report 2005/290
    • J. Groth, R. Ostrovsky, and A. Sahai. Perfect Non-Interactive Zero Knowledge for NP. Cryptology ePrint Archive, Report 2005/290, 2005.
    • (2005)
    • Groth, J.1    Ostrovsky, R.2    Sahai, A.3
  • 18
    • 35048878760 scopus 로고    scopus 로고
    • Multi-designated Verifiers Signatures
    • J. Lopez, S. Qing, and E. Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Proceedings, of, Springer-Verlag
    • F. Laguillaumie and D. Vergnaud. Multi-designated Verifiers Signatures. In J. Lopez, S. Qing, and E. Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 495-507. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3269 , pp. 495-507
    • Laguillaumie, F.1    Vergnaud, D.2
  • 19
    • 84946833891 scopus 로고    scopus 로고
    • How to Leak a Secret
    • C. Boyd, editor, Advances in Cryptology, ASIA CRYPT 2001, Proceedings, of, Springer
    • R. L. Rivest, A. Shamir, and Y. Tauman. How to Leak a Secret. In C. Boyd, editor, Advances in Cryptology - ASIA CRYPT 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 552-565. Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 20
    • 26444566695 scopus 로고    scopus 로고
    • Non-Interactive Deniable Ring Authentication
    • J. I. Lim and D. H. Lee, editors, Information Security and Cryptology, ICISC 2003, Revised Papers, of, Springer-Verlag
    • W. Susilo and Y. Mu. Non-Interactive Deniable Ring Authentication. In J. I. Lim and D. H. Lee, editors, Information Security and Cryptology - ICISC 2003, Revised Papers, volume 2971 of Lecture Notes in Computer Science, pages 386-401. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2971 , pp. 386-401
    • Susilo, W.1    Mu, Y.2
  • 21
    • 26444587096 scopus 로고    scopus 로고
    • Perfect Concurrent Signature Schemes
    • J. Lopez, S. Qing, and E. Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Proceedings, of, Springer-Verlag, Oct
    • W. Susilo, Y. Mu, and F. Zhang. Perfect Concurrent Signature Schemes. In J. Lopez, S. Qing, and E. Okamoto, editors, Information and Communications Security, 6th International Conference, ICICS 2004, Proceedings, volume 3269 of Lecture Notes in Computer Science, pages 14-26. Springer-Verlag, Oct. 2004.
    • (2004) Lecture Notes in Computer Science , vol.3269 , pp. 14-26
    • Susilo, W.1    Mu, Y.2    Zhang, F.3
  • 22
    • 26444498123 scopus 로고    scopus 로고
    • Tight Reductions among Strong Diffie-Hellman Assumptions. Cryptology ePrint Archive
    • Report 2005/057
    • V. K. Wei. Tight Reductions among Strong Diffie-Hellman Assumptions. Cryptology ePrint Archive, Report 2005/057, 2005.
    • (2005)
    • Wei, V.K.1
  • 23
    • 23944519368 scopus 로고    scopus 로고
    • A Ring Signature Scheme Using Bilinear Pairings
    • C. H. Lim and M. Yung, editors, Information Security Applications, 5th International Workshop, WISA, Revised Papers, of, Springer-Verlag
    • J. Xu, Z. Zhang, and D. Feng. A Ring Signature Scheme Using Bilinear Pairings. In C. H. Lim and M. Yung, editors, Information Security Applications, 5th International Workshop, WISA 2004, Revised Papers, volume 3325 of Lecture Notes in Computer Science, pages 163-172. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3325 , pp. 163-172
    • Xu, J.1    Zhang, Z.2    Feng, D.3
  • 24
    • 84958765355 scopus 로고    scopus 로고
    • ID-Based Blind Signature and Ring Signature from Pairings
    • Y. Zheng, editor, Advances in Cryptology, ASIA CRYPT 2002, Proceedings, of, Springer
    • F. Zhang and K. Kim. ID-Based Blind Signature and Ring Signature from Pairings. In Y. Zheng, editor, Advances in Cryptology - ASIA CRYPT 2002, Proceedings, volume 2501 of Lecture Notes in Computer Science, pages 533-547. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 533-547
    • Zhang, F.1    Kim, K.2
  • 25
    • 35048854587 scopus 로고    scopus 로고
    • F. Zhang, R. Safavi-Naini, and W. Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Application. In F. Bao, R. H. Deng, and J. Zhou, editors, Public Key Cryptography - PKC 2004, Proceedings, 2947 of Lecture, Notes in Computer Science, pages 277-290. Springer, 2004.
    • F. Zhang, R. Safavi-Naini, and W. Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Application. In F. Bao, R. H. Deng, and J. Zhou, editors, Public Key Cryptography - PKC 2004, Proceedings, volume 2947 of Lecture, Notes in Computer Science, pages 277-290. Springer, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.