1 / 20

Certificateless Threshold Ring Signature

Certificateless Threshold Ring Signature. Source: Information Sciences 179(2009) 3685-3696 Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter: Chun-Yen Lee. Outline. Introduction Definition Proposed scheme Conclusion. Introduction. 2001 Rivest et al. Ring signature

lee-alston
Télécharger la présentation

Certificateless Threshold Ring Signature

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) 3685-3696 Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter: Chun-Yen Lee

  2. Outline • Introduction • Definition • Proposed scheme • Conclusion

  3. Introduction • 2001Rivest et al. • Ring signature • 2002Bresson et al. • extended the notion of ring signature to threshold setting • 2003Al-Riyami and Paterson • certificateless public key cryptography

  4. Ring signature • spontaneity • anonymity • Threshold setting • key escrow • certificateless public key cryptography

  5. Outline • Introduction • Definition • Proposed scheme • Conclusion

  6. Definition • SetUp • MasterKeyGen • PartialKeyGen • UserKeyGen • Sign • Verify

  7. Outline • Introduction • Definition • Proposed scheme • Conclusion

  8. An efficient 1-out-of-n certificateless ring signature A t-out-of-n certificateless Threshold Ring Signature (CL-TRS)

  9. An efficient 1-out-of-n certificateless ring signature • SetUp • Input: • Output: param • MasterKeyGen • Input: param • Randomly pick a master secret key • Master public key

  10. An efficient 1-out-of-n certificateless ring signature • PartialKeyGen • Input (param, msk, ID) • UserKeyGen • Input (param, mpk, ID) • Randomly pick a user secret key • user public key

  11. An efficient 1-out-of-n certificateless ring signature • Sign • Input (param, mpk, R, S, m) • Randomly pick • Compute

  12. An efficient 1-out-of-n certificateless ring signature • Compute • Compute • The signature is

  13. An efficient 1-out-of-n certificateless ring signature • Verify • Input (param, mpk, R, 1, S, m, σ) • if

  14. An efficient 1-out-of-n certificateless ring signature A t-out-of-n certificateless Threshold Ring Signature (CL-TRS)

  15. CL-TRS • Sign • Input (param, mpk, R, S, m) • 1.

  16. CL-TRS • 2. • 3. Compute • construct a polynomial fof degree n-t f(0)=c, f(i)=ci

  17. CL-TRS • 4. Compute • 5.Compute • The signature is

  18. CL-TRS • Verify • Input param, mpk, R, t, m, • the degree of polynomial f is n-t

  19. Outline • Introduction • Definition • Proposed scheme • Conclusion

  20. Conclusion • The author proposed one efficient 1-out-of-n CL-TRS and another t-out-of-n CL-TRS. • Both of them are more efficient than previous ones in both computational complexity and signature size.

More Related