Identity based threshold ring signature

66Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we present an identity based (ID-based) threshold ring signature scheme. The scheme is provably secure in the random oracle model and provides trusted authority compatibility. To the best of authors' knowledge, our scheme is the first ID-based threshold ring signature scheme which is also the most efficient (in terms of number of pairing operations required) ID-based ring signature scheme (when t = 1) and threshold ring signature scheme from pairings. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Chow, S. S. M., Hui, L. C. K., & Yiu, S. M. (2005). Identity based threshold ring signature. In Lecture Notes in Computer Science (Vol. 3506, pp. 218–232). Springer Verlag. https://doi.org/10.1007/11496618_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free