2011
DOI: 10.1007/978-3-642-25243-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Forward Secure Ring Signature without Random Oracles

Abstract: Abstract. In this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period. This is especially useful in the case of ring signature, as the exposure of a single secret key may result in the invalidity of thousands or even million… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…In particular, Vehicular Ad Hoc Networks (VANET) (a kind of ad hoc network specifically designed for vehicles) can also deploy ring signatures for authentication purposes [17]. 3) Smart Grid Security [45]: The smart grid is a new form of electricity network. One of the distinctive features in a smart grid is its capabilities for two-way data communication.…”
Section: A Related Cryptographic Notionsmentioning
confidence: 99%
“…In particular, Vehicular Ad Hoc Networks (VANET) (a kind of ad hoc network specifically designed for vehicles) can also deploy ring signatures for authentication purposes [17]. 3) Smart Grid Security [45]: The smart grid is a new form of electricity network. One of the distinctive features in a smart grid is its capabilities for two-way data communication.…”
Section: A Related Cryptographic Notionsmentioning
confidence: 99%
“…REVIEW OF THE LYZ RING SIGNATURE SCHEME In the LYZ ring signature [10], all users' keys are defined in a group G of composite order N . That group must be set up by a trusted authority, since the factorization of its order N must be kept secret.…”
Section: Preliminarymentioning
confidence: 99%
“…Remark 1. In order to prove the anonymity of LYZ signature scheme, the authors have to use the Subgroup Decision Assumption [10] with respect to the group G of composite order N . To the contrary, it just shows that the authority can trace out the real signer.…”
Section: A the Lyz Ring Signature Is Not Anonymousmentioning
confidence: 99%
See 1 more Smart Citation
“…Applications of ring signature schemes include whistle blowing [1], anonymous membership authentication for ad hoc groups [11], non-interactive deniable ring authentication [12], smart grid systems [13], perfect concurrent signature [14] and multi-designated verifiers signature [15].…”
Section: Introductionmentioning
confidence: 99%