New Certificateless Blind Ring Signature Scheme

A new certificateless blind ring signature scheme was proposed in this paper. The scheme could not only avoid the problem of certificate management of public key certificate cryptography, but also overcome the inherent key-escrow problem of identity-based public key cryptography. In the last, by using bilinear pairing technique, it was proved that this scheme satisfied the security of existential unforgeability, blindness and unconditional anonymity. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3382

[1]  Willy Susilo,et al.  Cryptanalysis on Two Certificateless Signature Schemes , 2010, Int. J. Comput. Commun. Control.

[2]  Yi Mu,et al.  On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.

[3]  Sherman S. M. Chow,et al.  Certificateless Ring Signatures , 2007, IACR Cryptol. ePrint Arch..

[4]  Joseph K. Liu,et al.  Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups , 2004, ESAS.

[5]  Zeng Ji-wen Two Certificateless Distributed Ring Signature Schemes , 2008 .

[6]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[7]  Wang Yu-min Certificateless partially blind signatures , 2009 .

[8]  Masayuki Abe,et al.  How to Date Blind Signatures , 1996, ASIACRYPT.

[9]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[10]  Jian Weng,et al.  Certificateless key-insulated signature without random oracles , 2009 .

[11]  Rui Zhang,et al.  An efficient and provably‐secure certificateless signature scheme without bilinear pairings , 2012, Int. J. Commun. Syst..

[12]  Yi Mu,et al.  An Efficient Static Blind Ring Signature Scheme , 2005, ICISC.

[13]  Javier Herranz,et al.  Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption , 2006, ISC.

[14]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[15]  Kyung Sup Kwak,et al.  Certificateless Partially Blind Signature , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[16]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[17]  Wei Wu,et al.  A Provably Secure Ring Signature Scheme in Certificateless Cryptography , 2007, ProvSec.