Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chu, Cheng-Kang | en_US |
dc.contributor.author | Tzeng, Wen-Guey | en_US |
dc.date.accessioned | 2014-12-08T15:08:53Z | - |
dc.date.available | 2014-12-08T15:08:53Z | - |
dc.date.issued | 2009-09-01 | en_US |
dc.identifier.issn | 1016-2364 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/6767 | - |
dc.description.abstract | The identity of "Deep Throat", a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official claimed that he was the anonymous source. Nevertheless, some are still inconvinced. In this paper, we introduce a new notion of identity-committable signatures (ICS) to ensure the anonymity of "Deep Throat" inside a group. A member of an organization can sign a message on behalf of himself (regular signature) or the organization (identity-committed signature). In the latter case, the signer's identity is hidden from anyone, and can be opened by himself only. We describe the requirements of ICS and give the formal definition of it. Then we extend the notion of ICS to group-oriented ring signatures (GRS) which further allow the signer to hide his identity behind multiple groups. Since the signer can include the whole members of a group at a time, our GRS scheme is more efficient and practical than general ring signature schemes. Finally, we provide concrete constructions of ICS and GRS with information-theoretic anonymity, that is, the identity of the signer is fully-protected. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | group signatures | en_US |
dc.subject | ring signatures | en_US |
dc.subject | anonymous signatures | en_US |
dc.subject | identity-based signatures | en_US |
dc.subject | pairing-based cryptography | en_US |
dc.title | Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes | en_US |
dc.type | Article | en_US |
dc.identifier.journal | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | en_US |
dc.citation.volume | 25 | en_US |
dc.citation.issue | 5 | en_US |
dc.citation.spage | 1465 | en_US |
dc.citation.epage | 1483 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000269626300010 | - |
Appears in Collections: | Conferences Paper |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.