|
Analysis and improvement of verifiable ring signature schemes
LI Xiao-lin LIANG Xiang-qian LIU Kui PAN Shuai
Journal of Computer Applications
2012, 32 (12):
3466-3469.
DOI: 10.3724/SP.J.1087.2012.03466
By analyzing the certificateless verifiable ring signature scheme (LUO DAWEN, HE MINGXING, LI XIAO. Certificateless verifiable ring signature scheme. Computer Engineering,2009, 35(15): 135-137) and the verifiable proxy ring signature scheme (LUO DAWEN, HE MINGXING, LI XIAO.A verifiable proxy ring signature scheme.Journal of Southwest University for Nationalities:Natural Science Edition, 2009, 35(3):608-611), it was found that these convertible ring signature schemes were susceptible to non-repudiation attack, i.e., any member in the ring can impersonate others identity to sign the message and the verifier believed the signature was signed by the latter. To address the above problems, improved schemes were proposed by using the private key of the signer to have a secret value. The security analysis proves that the improved schemes overcome the security defect of the original scheme and satisfy all security requirements of verifiable ring signature.
Related Articles |
Metrics
|
|