A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
Uloženo v:
| Název: | A New Efficient Threshold Ring Signature Scheme Based on Coding Theory |
|---|---|
| Autoři: | Aguilar Melchor, Carlos, Cayrel, Pierre-Louis, Gaborit, Philippe, Laguillaumie, Fabien |
| Přispěvatelé: | DMI (XLIM-DMI), XLIM (XLIM), Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS), Center for Advanced Security Research Darmstadt Darmstadt (CASED), Technische Universität Darmstadt - Technical University of Darmstadt (TU Darmstadt), Equipe AMACC - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS) |
| Zdroj: | ISSN: 0018-9448 ; IEEE Transactions on Information Theory ; https://hal.science/hal-01083807 ; IEEE Transactions on Information Theory, 2011, pp.4833-4842. ⟨10.1007/978-3-540-88403-3_1⟩. |
| Informace o vydavateli: | CCSD Institute of Electrical and Electronics Engineers |
| Rok vydání: | 2011 |
| Sbírka: | Université de Limoges: HAL |
| Témata: | Threshold ring signature, code-based cryptography, Stern's scheme, syndrome decoding, [INFO]Computer Science [cs], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] |
| Popis: | International audience ; —Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. These sig-natures allow a signer to anonymously authenticate a message on behalf of a group of his choice. This concept was then extended by Bresson, Stern and Szydlo into -out-of-(threshold) ring signatures in 2002 [9]. We propose in this article a generalization of Stern's code based identification (and signature) scheme [36] to design a practical -out-of-threshold ring signature scheme. The size of the resulting signatures is in () and does not depend on , contrary to most of the existing protocols. Our scheme is existentially unforge-able under a chosen message attack in the random oracle model assuming the hardness of the minimum distance problem, is unconditionally source hiding, has a very short public key and has an overall complexity in (). This protocol is the first efficient code-based ring signature scheme and the first code-based thresh-old ring signature scheme. Moreover it has a better complexity than number-theory based schemes which have a complexity in (). This paper is an extended version of [2] with complete proofs and definitions. |
| Druh dokumentu: | article in journal/newspaper |
| Jazyk: | English |
| DOI: | 10.1007/978-3-540-88403-3_1 |
| Dostupnost: | https://hal.science/hal-01083807 https://hal.science/hal-01083807v1/document https://hal.science/hal-01083807v1/file/RIACL-AGUILARMELCHOR-2011-1.pdf https://doi.org/10.1007/978-3-540-88403-3_1 |
| Rights: | info:eu-repo/semantics/OpenAccess |
| Přístupové číslo: | edsbas.51B6D26F |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://hal.science/hal-01083807# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Melchor%20A Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.51B6D26F RelevancyScore: 843 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 842.654235839844 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: A New Efficient Threshold Ring Signature Scheme Based on Coding Theory – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Aguilar+Melchor%2C+Carlos%22">Aguilar Melchor, Carlos</searchLink><br /><searchLink fieldCode="AR" term="%22Cayrel%2C+Pierre-Louis%22">Cayrel, Pierre-Louis</searchLink><br /><searchLink fieldCode="AR" term="%22Gaborit%2C+Philippe%22">Gaborit, Philippe</searchLink><br /><searchLink fieldCode="AR" term="%22Laguillaumie%2C+Fabien%22">Laguillaumie, Fabien</searchLink> – Name: Author Label: Contributors Group: Au Data: DMI (XLIM-DMI)<br />XLIM (XLIM)<br />Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)<br />Center for Advanced Security Research Darmstadt Darmstadt (CASED)<br />Technische Universität Darmstadt - Technical University of Darmstadt (TU Darmstadt)<br />Equipe AMACC - Laboratoire GREYC - UMR6072<br />Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC)<br />Université de Caen Normandie (UNICAEN)<br />Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)<br />Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN)<br />Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS) – Name: TitleSource Label: Source Group: Src Data: <i>ISSN: 0018-9448 ; IEEE Transactions on Information Theory ; https://hal.science/hal-01083807 ; IEEE Transactions on Information Theory, 2011, pp.4833-4842. ⟨10.1007/978-3-540-88403-3_1⟩</i>. – Name: Publisher Label: Publisher Information Group: PubInfo Data: CCSD<br />Institute of Electrical and Electronics Engineers – Name: DatePubCY Label: Publication Year Group: Date Data: 2011 – Name: Subset Label: Collection Group: HoldingsInfo Data: Université de Limoges: HAL – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Threshold+ring+signature%22">Threshold ring signature</searchLink><br /><searchLink fieldCode="DE" term="%22code-based+cryptography%22">code-based cryptography</searchLink><br /><searchLink fieldCode="DE" term="%22Stern's+scheme%22">Stern's scheme</searchLink><br /><searchLink fieldCode="DE" term="%22syndrome+decoding%22">syndrome decoding</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO]Computer+Science+[cs]%22">[INFO]Computer Science [cs]</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-CR]Computer+Science+[cs]%2FCryptography+and+Security+[cs%2ECR]%22">[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]</searchLink> – Name: Abstract Label: Description Group: Ab Data: International audience ; —Ring signatures were introduced by Rivest, Shamir and Tauman in 2001 [32]. These sig-natures allow a signer to anonymously authenticate a message on behalf of a group of his choice. This concept was then extended by Bresson, Stern and Szydlo into -out-of-(threshold) ring signatures in 2002 [9]. We propose in this article a generalization of Stern's code based identification (and signature) scheme [36] to design a practical -out-of-threshold ring signature scheme. The size of the resulting signatures is in () and does not depend on , contrary to most of the existing protocols. Our scheme is existentially unforge-able under a chosen message attack in the random oracle model assuming the hardness of the minimum distance problem, is unconditionally source hiding, has a very short public key and has an overall complexity in (). This protocol is the first efficient code-based ring signature scheme and the first code-based thresh-old ring signature scheme. Moreover it has a better complexity than number-theory based schemes which have a complexity in (). This paper is an extended version of [2] with complete proofs and definitions. – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Language Label: Language Group: Lang Data: English – Name: DOI Label: DOI Group: ID Data: 10.1007/978-3-540-88403-3_1 – Name: URL Label: Availability Group: URL Data: https://hal.science/hal-01083807<br />https://hal.science/hal-01083807v1/document<br />https://hal.science/hal-01083807v1/file/RIACL-AGUILARMELCHOR-2011-1.pdf<br />https://doi.org/10.1007/978-3-540-88403-3_1 – Name: Copyright Label: Rights Group: Cpyrght Data: info:eu-repo/semantics/OpenAccess – Name: AN Label: Accession Number Group: ID Data: edsbas.51B6D26F |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.51B6D26F |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1007/978-3-540-88403-3_1 Languages: – Text: English Subjects: – SubjectFull: Threshold ring signature Type: general – SubjectFull: code-based cryptography Type: general – SubjectFull: Stern's scheme Type: general – SubjectFull: syndrome decoding Type: general – SubjectFull: [INFO]Computer Science [cs] Type: general – SubjectFull: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] Type: general Titles: – TitleFull: A New Efficient Threshold Ring Signature Scheme Based on Coding Theory Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Aguilar Melchor, Carlos – PersonEntity: Name: NameFull: Cayrel, Pierre-Louis – PersonEntity: Name: NameFull: Gaborit, Philippe – PersonEntity: Name: NameFull: Laguillaumie, Fabien – PersonEntity: Name: NameFull: DMI (XLIM-DMI) – PersonEntity: Name: NameFull: XLIM (XLIM) – PersonEntity: Name: NameFull: Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS) – PersonEntity: Name: NameFull: Center for Advanced Security Research Darmstadt Darmstadt (CASED) – PersonEntity: Name: NameFull: Technische Universität Darmstadt - Technical University of Darmstadt (TU Darmstadt) – PersonEntity: Name: NameFull: Equipe AMACC - Laboratoire GREYC - UMR6072 – PersonEntity: Name: NameFull: Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC) – PersonEntity: Name: NameFull: Université de Caen Normandie (UNICAEN) – PersonEntity: Name: NameFull: Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN) – PersonEntity: Name: NameFull: Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN) – PersonEntity: Name: NameFull: Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS) IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2011 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: ISSN: 0018-9448 ; IEEE Transactions on Information Theory ; https://hal.science/hal-01083807 ; IEEE Transactions on Information Theory, 2011, pp.4833-4842. ⟨10.1007/978-3-540-88403-3_1⟩ Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science