2008
DOI: 10.1007/978-3-540-88403-3_1
|View full text |Cite
|
Sign up to set email alerts
|

A New Efficient Threshold Ring Signature Scheme Based on Coding Theory

Abstract: International audience—Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. These sig-natures allow a signer to anonymously authenticate a message on behalf of a group of his choice. This concept was then extended by Bresson, Stern and Szydlo into -out-of-(threshold) ring signatures in 2002 [9]. We propose in this article a generalization of Stern's code based identification (and signature) scheme [36] to design a practical -out-of-threshold ring signature scheme. The size of the resultin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0
1

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(23 citation statements)
references
References 27 publications
0
22
0
1
Order By: Relevance
“…Existing threshold ring signature schemes are mostly based on the number theory [14][15][16][17]; hence, as mentioned above, such schemes could be insecure in the quantum world. To the best of our knowledge, Dallot and Vergnaud's scheme [18] and Aguilar Melchor et al 's scheme [19] are the only two code-based threshold ring signature schemes published in the literature. Dallot and Vergnaud's scheme [18] combined Bresson et al 's construction [13] and Courtois et al 's signature [20], which results in the signature size twice the number of system users.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing threshold ring signature schemes are mostly based on the number theory [14][15][16][17]; hence, as mentioned above, such schemes could be insecure in the quantum world. To the best of our knowledge, Dallot and Vergnaud's scheme [18] and Aguilar Melchor et al 's scheme [19] are the only two code-based threshold ring signature schemes published in the literature. Dallot and Vergnaud's scheme [18] combined Bresson et al 's construction [13] and Courtois et al 's signature [20], which results in the signature size twice the number of system users.…”
Section: Introductionmentioning
confidence: 99%
“…Dallot and Vergnaud's scheme [18] combined Bresson et al 's construction [13] and Courtois et al 's signature [20], which results in the signature size twice the number of system users. Aguilar Melchor et al 's scheme [19] is a generalization of Stern's identification and signature scheme [21] and has low efficiency in the signature size.…”
Section: Introductionmentioning
confidence: 99%
“…size in bits Sign. cost in bops Identity Based Signatures PGGG [9] 2 m tm (≈ 0.7 MB) 2 m × r1 (≈ 1.1 MB) t!t 2 m 2 (1/2 + 2 + 6/m)(≈ 2 45 ) Ring Signatures ZLC [44] 2 m tm (≈ 0.7 MB) tm + log 2 ( 2 m t )l (≈ 0.95 kB) t!t 2 m 2 (≈ 2 43.8 ) Threshold(ring) Signatures ACG [28] n 2 N/2 (≈ 2.41 MB) 20000 × N (≈ 0.24 MB) 140n 2 N (≈ 2 32.3 ) DV [17] 2 m tmN (≈ 70 MB) A(m, t, N, l) (≈ 5.2 kB) B(m, t, N, l) (≈ 2 35.4 ) Blind Signatures…”
Section: Schemesunclassified
“…Dallot developed the security proof of CFS signature scheme in a modified version introduced by himself . There are a few provable secure code‐based signatures proposed, such as code‐based ring signature schemes and code‐based undeniable signature scheme . Also a DVS scheme is presented in .…”
Section: Introductionmentioning
confidence: 99%