A New Efficient Threshold Ring Signature Scheme Based on Coding Theory

Uloženo v:
Podrobná bibliografie
Název: A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
Autoři: Aguilar Melchor, Carlos, Cayrel, Pierre-Louis, Gaborit, Philippe, Laguillaumie, Fabien
Přispěvatelé: DMI (XLIM-DMI), XLIM (XLIM), Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS), Center for Advanced Security Research Darmstadt Darmstadt (CASED), Technische Universität Darmstadt - Technical University of Darmstadt (TU Darmstadt), Equipe AMACC - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)
Zdroj: ISSN: 0018-9448 ; IEEE Transactions on Information Theory ; https://hal.science/hal-01083807 ; IEEE Transactions on Information Theory, 2011, pp.4833-4842. ⟨10.1007/978-3-540-88403-3_1⟩.
Informace o vydavateli: CCSD
Institute of Electrical and Electronics Engineers
Rok vydání: 2011
Sbírka: Université de Limoges: HAL
Témata: Threshold ring signature, code-based cryptography, Stern's scheme, syndrome decoding, [INFO]Computer Science [cs], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Popis: International audience ; —Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. These sig-natures allow a signer to anonymously authenticate a message on behalf of a group of his choice. This concept was then extended by Bresson, Stern and Szydlo into -out-of-(threshold) ring signatures in 2002 [9]. We propose in this article a generalization of Stern's code based identification (and signature) scheme [36] to design a practical -out-of-threshold ring signature scheme. The size of the resulting signatures is in () and does not depend on , contrary to most of the existing protocols. Our scheme is existentially unforge-able under a chosen message attack in the random oracle model assuming the hardness of the minimum distance problem, is unconditionally source hiding, has a very short public key and has an overall complexity in (). This protocol is the first efficient code-based ring signature scheme and the first code-based thresh-old ring signature scheme. Moreover it has a better complexity than number-theory based schemes which have a complexity in (). This paper is an extended version of [2] with complete proofs and definitions.
Druh dokumentu: article in journal/newspaper
Jazyk: English
DOI: 10.1007/978-3-540-88403-3_1
Dostupnost: https://hal.science/hal-01083807
https://hal.science/hal-01083807v1/document
https://hal.science/hal-01083807v1/file/RIACL-AGUILARMELCHOR-2011-1.pdf
https://doi.org/10.1007/978-3-540-88403-3_1
Rights: info:eu-repo/semantics/OpenAccess
Přístupové číslo: edsbas.51B6D26F
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://hal.science/hal-01083807#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Melchor%20A
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.51B6D26F
RelevancyScore: 843
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 842.654235839844
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Aguilar+Melchor%2C+Carlos%22">Aguilar Melchor, Carlos</searchLink><br /><searchLink fieldCode="AR" term="%22Cayrel%2C+Pierre-Louis%22">Cayrel, Pierre-Louis</searchLink><br /><searchLink fieldCode="AR" term="%22Gaborit%2C+Philippe%22">Gaborit, Philippe</searchLink><br /><searchLink fieldCode="AR" term="%22Laguillaumie%2C+Fabien%22">Laguillaumie, Fabien</searchLink>
– Name: Author
  Label: Contributors
  Group: Au
  Data: DMI (XLIM-DMI)<br />XLIM (XLIM)<br />Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)<br />Center for Advanced Security Research Darmstadt Darmstadt (CASED)<br />Technische Universität Darmstadt - Technical University of Darmstadt (TU Darmstadt)<br />Equipe AMACC - Laboratoire GREYC - UMR6072<br />Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC)<br />Université de Caen Normandie (UNICAEN)<br />Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)<br />Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN)<br />Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)
– Name: TitleSource
  Label: Source
  Group: Src
  Data: <i>ISSN: 0018-9448 ; IEEE Transactions on Information Theory ; https://hal.science/hal-01083807 ; IEEE Transactions on Information Theory, 2011, pp.4833-4842. ⟨10.1007/978-3-540-88403-3_1⟩</i>.
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: CCSD<br />Institute of Electrical and Electronics Engineers
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2011
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: Université de Limoges: HAL
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Threshold+ring+signature%22">Threshold ring signature</searchLink><br /><searchLink fieldCode="DE" term="%22code-based+cryptography%22">code-based cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22Stern's+scheme%22">Stern's scheme</searchLink><br /><searchLink fieldCode="DE" term="%22syndrome+decoding%22">syndrome decoding</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO]Computer+Science+[cs]%22">[INFO]Computer Science [cs]</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-CR]Computer+Science+[cs]%2FCryptography+and+Security+[cs%2ECR]%22">[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: International audience ; —Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. These sig-natures allow a signer to anonymously authenticate a message on behalf of a group of his choice. This concept was then extended by Bresson, Stern and Szydlo into -out-of-(threshold) ring signatures in 2002 [9]. We propose in this article a generalization of Stern's code based identification (and signature) scheme [36] to design a practical -out-of-threshold ring signature scheme. The size of the resulting signatures is in () and does not depend on , contrary to most of the existing protocols. Our scheme is existentially unforge-able under a chosen message attack in the random oracle model assuming the hardness of the minimum distance problem, is unconditionally source hiding, has a very short public key and has an overall complexity in (). This protocol is the first efficient code-based ring signature scheme and the first code-based thresh-old ring signature scheme. Moreover it has a better complexity than number-theory based schemes which have a complexity in (). This paper is an extended version of [2] with complete proofs and definitions.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.1007/978-3-540-88403-3_1
– Name: URL
  Label: Availability
  Group: URL
  Data: https://hal.science/hal-01083807<br />https://hal.science/hal-01083807v1/document<br />https://hal.science/hal-01083807v1/file/RIACL-AGUILARMELCHOR-2011-1.pdf<br />https://doi.org/10.1007/978-3-540-88403-3_1
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: info:eu-repo/semantics/OpenAccess
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.51B6D26F
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.51B6D26F
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1007/978-3-540-88403-3_1
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Threshold ring signature
        Type: general
      – SubjectFull: code-based cryptography
        Type: general
      – SubjectFull: Stern's scheme
        Type: general
      – SubjectFull: syndrome decoding
        Type: general
      – SubjectFull: [INFO]Computer Science [cs]
        Type: general
      – SubjectFull: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
        Type: general
    Titles:
      – TitleFull: A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Aguilar Melchor, Carlos
      – PersonEntity:
          Name:
            NameFull: Cayrel, Pierre-Louis
      – PersonEntity:
          Name:
            NameFull: Gaborit, Philippe
      – PersonEntity:
          Name:
            NameFull: Laguillaumie, Fabien
      – PersonEntity:
          Name:
            NameFull: DMI (XLIM-DMI)
      – PersonEntity:
          Name:
            NameFull: XLIM (XLIM)
      – PersonEntity:
          Name:
            NameFull: Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)
      – PersonEntity:
          Name:
            NameFull: Center for Advanced Security Research Darmstadt Darmstadt (CASED)
      – PersonEntity:
          Name:
            NameFull: Technische Universität Darmstadt - Technical University of Darmstadt (TU Darmstadt)
      – PersonEntity:
          Name:
            NameFull: Equipe AMACC - Laboratoire GREYC - UMR6072
      – PersonEntity:
          Name:
            NameFull: Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC)
      – PersonEntity:
          Name:
            NameFull: Université de Caen Normandie (UNICAEN)
      – PersonEntity:
          Name:
            NameFull: Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)
      – PersonEntity:
          Name:
            NameFull: Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN)
      – PersonEntity:
          Name:
            NameFull: Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2011
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: ISSN: 0018-9448 ; IEEE Transactions on Information Theory ; https://hal.science/hal-01083807 ; IEEE Transactions on Information Theory, 2011, pp.4833-4842. ⟨10.1007/978-3-540-88403-3_1⟩
              Type: main
ResultId 1