DocumentCode :
2395099
Title :
How to leak a secret from multiple sources
Author :
Reny, J. ; Harn, Lein ; Tongtong Li
Author_Institution :
Dept. of ECE, Michigan State Univ., East Lansing, MI
fYear :
2008
fDate :
16-19 Nov. 2008
Firstpage :
1
Lastpage :
6
Abstract :
A (t, n) threshold ring signature, introduced by Bresson et al., allows a group of t members to leak a secret anonymously. Threshold ring signature schemes are desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we first point out that the construction of threshold ring signature is very inefficient when t is small comparing to n. Next, a generalized (t, n) threshold signature scheme is first proposed in literature through a linear equation system with t equations but n variables. The proposed generalized threshold signature is linkable and convertible. Our generalized construction is unconditionally signer-ambiguous, provable secure in random oracle model and exceptionally efficient.
Keywords :
digital signatures; public key cryptography; telecommunication security; ad-hoc group communication; linear equation system; mobile ad-hoc network; public key cryptography; random oracle model; secret leakage; threshold ring signature scheme; Ad hoc networks; Artificial intelligence; Cities and towns; Equations; Identity management systems; Polynomials; Public key; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2008. MILCOM 2008. IEEE
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-2676-8
Electronic_ISBN :
978-1-4244-2677-5
Type :
conf
DOI :
10.1109/MILCOM.2008.4753202
Filename :
4753202
Link To Document :
بازگشت