Advanced Search
Volume 31 Issue 7
Dec.  2010
Turn off MathJax
Article Contents
Wang Hua-qun, Guo Xian-jiu, Yu Hong, Peng Yu-xu. Cryptanalysis and Improvement of Several Convertible Ring Signature Schemes[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1732-1735. doi: 10.3724/SP.J.1146.2008.00928
Citation: Wang Hua-qun, Guo Xian-jiu, Yu Hong, Peng Yu-xu. Cryptanalysis and Improvement of Several Convertible Ring Signature Schemes[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1732-1735. doi: 10.3724/SP.J.1146.2008.00928

Cryptanalysis and Improvement of Several Convertible Ring Signature Schemes

doi: 10.3724/SP.J.1146.2008.00928
  • Received Date: 2008-07-18
  • Rev Recd Date: 2008-11-10
  • Publish Date: 2009-07-19
  • The security of the three convertible ring signature schemes proposed by Zhang-Liu-He (2006), Gan-Chen (2004) and Wang-Zhang-Ma(2007) is analyzed, and it is found that these convertible ring signature schemes are susceptible to convertibility attack or non-repudiation attack, i.e., any member in the ring can claim that he is the actual signer or pretend others identity to sign message. To guard against the attack, these convertible ring signature schemes are improved, which can make the improved schemes satisfy the security requirements for convertible ring signature.
  • loading
  • Rivest R L, Shamir A, and Tauman Y. How to leak a secret[J].Advances in cryptology-AsiaCrypt01, Berlin: Springer-Verlag.2001, LNCS 2248:552-565[2]Masayuki abe, Miyako ohkubo, and Koutarou suzuki.1-out-of-n signatures from a variety of keys. IEICE Trans. onFundamentals, 2004, E87-A: 131-140.[3]Liu Y W, Liu J K, Mu Y, Susilo W, and Wong S. Revocablering signature[J].Journal of Computer Science and Technology.2007, 22(6):785-794[4]Au M H, Liu J K, Susilo W, and Yuen T H. Certificate based(linkable) ring signature. ISPEC 2007, Berlin: Springer-Verlag, 2007, LNCS 4464: 79-92.[5]Zhang Lei, Zhang Futai, and Wu Wei. A provably secure ringsignature scheme in certificateless cryptography. ProvSec2007, Berlin: Springer-Verlag, LNCS 4784: 103-121.[6]Rivest R L, Shamir A, and Tauman Y. How to leak a secret :Theory and Applications of Ring Signatures. Essays inMemory of Shimon Even 2006: 164-186.[7]范安东, 孙琦, 张杨松. 基于环签名的匿名电子投票方案. 四川大学学报(工程科学版), 2008, 40(1): 113-117.Fan An-dong, Sun Qi, and Zhang Yang-song. The scheme ofanonymous electronic voting based on ring signature. Journalof Sichuan University (Engineering Science Edition), 2008,40(1): 113-117.[8]苗付友, 王行甫, 苗辉, 熊焰. 一种支持悬赏的匿名电子举报方案. 电子学报, 2008, 36(2): 320-324.Miao Fu-you, Wang Xing-fu, Miao Hui, and Xiong Yan. Ananonymous e-prosecution scheme with reward support. ActaElectronica Sinica, 2008, 36(2): 320-324.[9]L Jiqiang and Wang Xinmei. Verifiable ring signature. The9th International Conference on Distribted MultimediaSystems, USA, 2003: 663-667.[10]Zhang Changlun, Liu Yun, and He Dequan. A new verifiablering signature scheme based on Nyberg-Rueppel scheme.ICSP2006, Beijing 2006, 4: 16-20.[11]Gan Zhi and Chen Kefei. A new verifiable ring signaturescheme. Acta Scientiarum Naturalium UniversitatisSunyatseni, 2004, 143, Suppl1(2): 132-134.[12]Lee K C, Wen H A, and Hwang T. Convertible ring signature[J].IEE Proc.-Commun.2005, 152(4):411-414[13]Gao Wei, Wang Guilin, Wang Xueli, and Xie Dongqing.Controllable ring signatures. WISA 2006, Berlin: Springer-Verlag, 2007, LNCS4298: 1-14.[14]Wang Lingling, Zhang Guoyin, and Ma Chunguang. A securering signcryption scheme for private and anonymouscommunication. 2007 IFIP International Conference onNetwork and Parallel Computing-Workshops, Harbin, 2007:107-111.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3247) PDF downloads(875) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return