Certificateless ring signature based on RSA problem and DL problem
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 49 (2015) no. 4, pp. 307-318.

Certificateless public key cryptography solves the certificate management problem in the traditional public key cryptography and the key escrow problem in identity-based cryptography. RSA is a key cryptography technique and provides various interfaces for the applied software in real-life scenarios. To the best of our knowledge, all of the known certificateless ring signature schemes employed bilinear pairings. But the computation cost of the pairings is much higher than that of the exponentiation in a RSA group. In this paper, we present the first certificateless ring signature scheme without pairing and prove the security in the random oracle model. The security of the scheme is closely related to the RSA problem and the discrete logarithm (DL) problem.

Reçu le :
Accepté le :
DOI : 10.1051/ita/2016013
Classification : 94A60
Mots clés : Certificateless cryptography, ring signature, RSA, DL problem
Deng, Lunzhi 1

1 School of Mathematical Sciences, Guizhou Normal University, Guiyang 550001, P.R. China.
@article{ITA_2015__49_4_307_0,
     author = {Deng, Lunzhi},
     title = {Certificateless ring signature based on {RSA} problem and {DL} problem},
     journal = {RAIRO - Theoretical Informatics and Applications - Informatique Th\'eorique et Applications},
     pages = {307--318},
     publisher = {EDP-Sciences},
     volume = {49},
     number = {4},
     year = {2015},
     doi = {10.1051/ita/2016013},
     mrnumber = {3507249},
     zbl = {1401.94148},
     language = {en},
     url = {http://www.numdam.org./articles/10.1051/ita/2016013/}
}
TY  - JOUR
AU  - Deng, Lunzhi
TI  - Certificateless ring signature based on RSA problem and DL problem
JO  - RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
PY  - 2015
SP  - 307
EP  - 318
VL  - 49
IS  - 4
PB  - EDP-Sciences
UR  - http://www.numdam.org./articles/10.1051/ita/2016013/
DO  - 10.1051/ita/2016013
LA  - en
ID  - ITA_2015__49_4_307_0
ER  - 
%0 Journal Article
%A Deng, Lunzhi
%T Certificateless ring signature based on RSA problem and DL problem
%J RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
%D 2015
%P 307-318
%V 49
%N 4
%I EDP-Sciences
%U http://www.numdam.org./articles/10.1051/ita/2016013/
%R 10.1051/ita/2016013
%G en
%F ITA_2015__49_4_307_0
Deng, Lunzhi. Certificateless ring signature based on RSA problem and DL problem. RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications, Tome 49 (2015) no. 4, pp. 307-318. doi : 10.1051/ita/2016013. http://www.numdam.org./articles/10.1051/ita/2016013/

S.S. Al-Riyami and K.G. Paterson, Certificateless public cryptography. In: Advances in Cryptology-Asiacrypt, edited by C.S. Laih. Vol. 2894 of Lect. Notes Comput. Sci. (2003) 452–473. | MR | Zbl

A. Bender, J. Katz and R. Morselli, Ring signatures: stronger definitions, and constructions without random Oracles. J. Cryptology 22 (2009) 114–138. | DOI | MR | Zbl

S. Chang, D.S. Wong, Y. Mu and Z.F. Zhang, Certificateless threshold ring signature. Inf. Sci. 179 (2009) 3685–3696. | DOI | MR | Zbl

S.S.M. Chow and W.S. Yap, Certificateless ring signature. Cryptology ePrinArchive: Report 2007/236. Available at http://eprint.iacr.org/2007/236

S.S.M. Chow, S.M. Yiu and L.C.K. Hui, Efficient identity based ring signature. ACNS’05, Vol. 3531 of Lect. Notes Comput. Sci. 499–512. | Zbl

X. Cao and W. Kou, A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Inf. Sci. 180 (2010) 2895–2903. | DOI | MR | Zbl

X.D. Dong and H.M. Lu, An Improved RSA-Based Certificateless Signature Scheme. Appl. Mech. Mater. 687 (2014) 2165–2168. | DOI

J. Herranz, Identity-based ring signatures from RSA. Theoret. Comput. Sci. 389 (2007) 100–117. | DOI | MR | Zbl

J. Herranz and G. Saez, New identity-based ring signature schemes. ICICS. Vol. 3269 of Lect. Notes Comput. Sci. (2004) 27–39. | Zbl

L. Nguyen, Accumulators from bilinear pairings and applications. CT-RSA (2005) 275–292. | MR | Zbl

R.L. Rivest, A. Shamir and Y. Tauman, How to leak a secret. ASIACRYPT’01. Vol. 2248 of Lect. Notes Comput. Sci. (2001) 552–565. | MR | Zbl

A. Shamir, Identity-based cryptosystem and signature scheme. In: Advances in Cryptology-Crypto. Vol. 196 of Lect. Notes Comput. Sci. (1984) 47–53. | MR

H.Q. Wang, Certificateless ring signature scheme from anonymous subsets. International Conference on Multimedia Information Networking and Security (2010) 413–417.

T.H. Yuen, J.K. Liu, M.H. Au, W. Susilo and J. Zhou, Efficient linkable and/or threshold ring signature without random oracles. Comput. J. 56 (2013) 407–421. | DOI

J. Zhang and J. Mao, An efficient RSA-based certificateless signature scheme. J. Systems Software 85 (2012) 638–642. | DOI

L. Zhang, F. Zhuang and W. Wu, A provably secure ring signature scheme in certificateless cryptography. In: Proc. of the Provsec. Vol. 4784 of Lect. Notes Comput. Sci. (2007) 103–121. | Zbl

Cité par Sources :