2006
DOI: 10.1007/11681878_4
|View full text |Cite
|
Sign up to set email alerts
|

Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles

Abstract: Ring signatures, first introduced by Rivest, Shamir, and Tauman, enable a user to sign a message so that a ring of possible signers (of which the user is a member) is identified, without revealing exactly which member of that ring actually generated the signature. In contrast to group signatures, ring signatures are completely "ad-hoc" and do not require any central authority or coordination among the various users (indeed, users do not even need to be aware of each other); furthermore, ring signature schemes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
134
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 231 publications
(134 citation statements)
references
References 17 publications
0
134
0
Order By: Relevance
“…Their ring signature is built on top of signatures of knowledge and accumulators, following Dodis et al [9]. The scheme description is only sketched and no proof of security is given but, for fairness (as also noted in [24]), their work is previous to the (now standard) formal definition of ring signatures of Bender et al [2]. Anyway, signatures of knowledge are built on top of simulation sound NIZK which in turn is built from standard NIZK.…”
Section: Related Workmentioning
confidence: 99%
“…Their ring signature is built on top of signatures of knowledge and accumulators, following Dodis et al [9]. The scheme description is only sketched and no proof of security is given but, for fairness (as also noted in [24]), their work is previous to the (now standard) formal definition of ring signatures of Bender et al [2]. Anyway, signatures of knowledge are built on top of simulation sound NIZK which in turn is built from standard NIZK.…”
Section: Related Workmentioning
confidence: 99%
“…This security property ensures that there is no computational way to forge a ring signature with only the knowledge of a list of public keys PK L = (pk i , ..., pk n ) of n members. Its security model is defined as the following game between a PPT A and C [42].…”
Section: Unforgeabilitymentioning
confidence: 99%
“…The main contribution to the research community of this protocol is that it provides user privacy-preserving distributed access control in a single-owner multi-user sensor network. A ring signature [56] is used to protect the anonymity of users by using a group ID and group signature. Each group of users has different access privileges, IDs and keys for signature.…”
Section: Users' Privacy-preserving Access Control (Uppac)mentioning
confidence: 99%