An Efficient Identity-Based Concurrent Signature Scheme

The concept of concurrent signature was first introduced by Chen, Kudla and Paterson in Eurocrypt’04, it contributes a novel approach for the traditional problem of fair exchange of signatures. Unfortunately we find out that in many concurrent signature schemes based on ring signatures, signers produced a signature, but his own cannot authenticate this signature was indeed produced by himself. To deal with this defect, in this paper, we proposed an efficient ID-based concurrent signature based on a ring signature scheme proposed by Zhang. It is a concurrent signature scheme with self-authenticating which can authenticate that a signer possesses a signature’s ownership. Finally, we discuss the performance of our signature.

[1]  N. Asokan,et al.  Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.

[2]  Edwin K. P. Chong,et al.  Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures , 2003, PODC '03.

[3]  Juan A. Garay,et al.  Timed Fair Exchange of Standard Signatures , 2003, IACR Cryptology ePrint Archive.

[4]  Kenneth G. Paterson,et al.  Concurrent Signatures , 2004, EUROCRYPT.

[5]  Hiroyuki Goto,et al.  Efficient Scheduling Focusing on the Duality of MPL Representation , 2007, 2007 IEEE Symposium on Computational Intelligence in Scheduling.

[6]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[7]  Chunguang Ma,et al.  An Efficient Ring Signature Scheme for Privacy and Anonymous Communication , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[8]  Jianhong Zhang,et al.  Another Efficient Identity-Based Ring Signature Scheme and Its Extension , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[9]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[10]  Willy Susilo,et al.  Generic Construction of (Identity-based) Perfect Concurrent Signatures , 2006, IACR Cryptol. ePrint Arch..

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Jan Camenisch,et al.  Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.