A new ring signature scheme with signer-admission property

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware Jong Youl Choi Computer Science Dept. Indiana University at Bloomington.
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Server-Aided Verification : Theory and Practice Source: ASIACRYPT 2005, LNCS 3788, pp Author: Marc Girault and David Lefranc Presenter: Chun-Yen.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter:
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
A Double-Efficient Integrity Verification Scheme to Cloud Storage Data Deng Hongyao, Song Xiuli, Tao jingsong 2014 TELKOMNIKA Indonesian Journal of Electrical.
By Jyh-haw Yeh Boise State University ICIKM 2013.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
Topic 22: Digital Schemes (2)
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
Kuo-Hua Wang, Chung-Ming Chan, Jung-Chang Liu Dept. of CSIE Fu Jen Catholic University Slide: Chih-Fan Lai Simulation and SAT-Based Boolean Matching for.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
A New Provably Secure Certificateless Signature Scheme Date: Reporter:Chien-Wen Huang 出處 :2008 IEEE International Conference on Communications.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter:
Feige-Fiat-Shamir Zero Knowledge Proof Based on difficulty of computing square roots mod a composite n Given two large primes p, q and n=p * q, computing.
KNAPSACK公開金鑰密碼學 Algorithms FINITE DEFINITENESS INPUT/OUTPUT GENERALITY
Overview Modern public-key cryptosystems: RSA
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Reporter :Chien-Wen Huang
Proxy Blind Signature Scheme
Author : Guilin Wang Source : Information Processing Letters
第四章 數位簽章.
第四章 數位簽章.
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
An efficient threshold RSA digital signature scheme
Anonymous Wireless Authentication on a Portable Cellular Mobile System
Chapter 1: Lesson 1.9 Inverse Functions
Security of a Remote Users Authentication Scheme Using Smart Cards
Identity-based deniable authentication protocol
Improving Lamport One-time Signature Scheme
Key agreement in wireless sensor network
Digital signatures.
Practical E-Payment Scheme
Digital Signature Schemes and the Random Oracle Model
ElGamal Public-Key Systems over GF(p) & GF(2m)
Pick a number, any number …
The Application of Elliptic Curves Cryptography in Embedded Systems
2 Understanding Variables and Solving Equations.
Digital Signatures…!.
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Bishop: Chapter 10 Key Management: Digital Signature
} 2x + 2(x + 2) = 36 2x + 2x + 4 = 36 4x + 4 = x =
Lecture 6: Digital Signature
The first number is posted telling what random number was selected, I did this for testing purposes, in the real thing it would not be there. Since the.
A New Provably Secure Certificateless Signature Scheme
Cryptology Design Fundamentals
CSC 774 Advanced Network Security
Cryptanalysis of Tseng et al.’s authenticated encrption schemes
Solving Multi Step Equations
Solving Multi Step Equations
Oblivious Transfer.
Cryptology Design Fundamentals
Cryptology Design Fundamentals
Improvements of Image Sharing with Steganography and Authentication
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
How to Use Charm Crypto Lib
LAB 3: Digital Signature
Presentation transcript:

A new ring signature scheme with signer-admission property Chih-Hung Wang, Chih-Yu Liu Information Sciences, Volume 177, Issue 3, 1 February 2007, Pages 747-754 Presenter: 楊智雄 2006-11-29

Outline Introduction Ring signature Proposed scheme Conclusion 2006-11-29

Introduction Ring signature is a simplified group signature was proposed in 2001 Two properties of ring signature Signer-ambiguity Setup-free This paper constructs signer-admission property into ring signature 2006-11-29

Ring signature 2006-11-29

Ring signature (conti.) Signer (users) Verifier 1.Compute k=h(m) 2.Pick a random glue value v 3.Pick random xi , 1≦i ≦r, i≠s and compute yi=gi(xi) 4.Solve Ck,v(y1,y2,...ys...yr)=v 5.Compute xs=gs-1(ys) (P1,P2,..,Pr ;v;x1,x2,..,xr) 1.Compute yi=gi(xi) , for i=1,2,...,r 2.Compute k=h(m) 3.Verify the following equation Ck,v(y1,y2,...ys...yr)=v 2006-11-29

Proposed scheme(1/4) Signature generation: Let the signer is As and the message is m Choose σ,z ,and compute a=gσmod p and b=az mod p Compute symmetric key k=h(m∥a) ⊕b Choose w ,and compute R=aw mod p and ε=w+z.F(m∥a,R) mod p 2006-11-29

Proposed scheme(2/4) Pick random xi , 1≦i ≦r, i≠s and compute yi=gi(xi) Choose random value v and solve Ck,v(y1,y2,...ys...yr)=v Compute xs=gs-1(ys) Output ring signature (P1,P2,..,Pr;v;x1,x2,..,xr;a,b,R,ε) 2006-11-29

Proposed scheme(3/4) Signature verification Let the signer is As and the message is m Check whether aε=R.bF(m∥a ,R) mod p compute yi=gi(xi) for i=1,2,...,r k=h(m∥a) ⊕b Verify the following equation Ck,v(y1,y2,...ys...yr)=v 2006-11-29

Proposed scheme(4/4) Signer-admission Signer (users) Designated verifier 1.Randomly choose γ,t 2.Compute λ=aγmod p 3.Compute commitment c = gλPKvt mod p c Randomly choose δ δ ω=γ+z δ (mod p) λ, t , ω Check c=gλPKvt mod p aω=λbδ mod p 2006-11-29

Conclusion Proposed an extended ring signature with a signer-admission property Using designated verifier proof to achieve signer-admission property 2006-11-29