J4

• 无栏目 • Previous Articles     Next Articles

An efficient IDbased proxy ring signature scheme

WU Lei 1, KONG Fanyu 2   

  1. 1. School of Mathematics, Shandong University, Jinan 250100, Shandong, China;
    2. Institute of Network Security, Shandong University, Jinan 250100, Shandong, China
  • Received:2008-09-10 Revised:1900-01-01 Online:2009-01-24 Published:2010-04-15

Abstract: In a proxy signature scheme, a potential signer delegates his signing power to a proxy, who signs a message on behalf of the original signer. The ring signature allows a user from a set of possible signers to convince the verifier that the author of the signature belongs to the set but the identity of the author is not disclosed. A new efficient IDbased proxy ring signature scheme was proposed based on the advantages of proxy signature and ring signature. Its security and efficiency was also discussed. Compared with Zhang’s scheme and Amit’s scheme, the new scheme has better computational efficiency.

Key words: proxy signature, ring signature, proxy ring signature, bilinear pairings

CLC Number: 

  • P309
[1] LUO Peng, YANG Xiao-yuan. Identity-based encryption in multiple PKG environment based on ring signature [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 64-68.
[2] XIE Shu-cui, SHAO Ai-xia, ZHANG Jian-zhong. A quantum multi-proxy blind signature scheme based on cluster state [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 105-110.
[3] XU Zhang, YANG Xiao-yuan, WEI Kang. Scheme of identity-based proxy ring signature on lattice in the standard model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(11): 40-46.
[4] YUAN Bian-qing, LIU Ji-qiang. An offline sharable mCoupons scheme based on NFC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 56-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!