In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we present an identity based (ID-based) threshold ring signature scheme. The scheme is provably secure in the random oracle model and provides trusted authority compatibility. To the best of authors' knowledge, our scheme is the first ID-based threshold ring signature scheme which is also the most efficient (in terms of number of pairing operations required) ID-based ring signature scheme (when t = 1) and threshold ring signature scheme from pairings. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Chow, S. S. M., Hui, L. C. K., & Yiu, S. M. (2005). Identity based threshold ring signature. In Lecture Notes in Computer Science (Vol. 3506, pp. 218–232). Springer Verlag. https://doi.org/10.1007/11496618_17
Mendeley helps you to discover research relevant for your work.