University of Wollongong
Browse

File(s) not publicly available

An efficient multivariate threshold ring signature scheme

journal contribution
posted on 2024-11-17, 16:14 authored by Dung H Duong, Ha TN Tran, Willy Susilo, Le Van Luyen
At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability [Formula presented]. Petzoldt et al. (AAECC 2013) extended that protocol into a threshold ring signature scheme, which later was improved by Zhang and Zhao (NSS 2014). In 2015, Monteiro et al. (IEICE 2015) improved the 3-pass identification protocol of Sakumoto et al. to the one with impersonation probability [Formula presented]. In this paper, we utilize the previous methods and the protocol by Monteiro et al. (2015)[20] to propose an efficient threshold ring signature. As a result, our scheme is more efficient than all previous multivariate threshold signature schemes in terms of both communication cost and signature length. In particular, the signature length of our scheme is 40% and 22% shorter than that of Petzoldt et al. and Zhang–Zhao respectively.

Funding

Concordia University of Edmonton (CRG-SEED-2005-01)

History

Journal title

Computer Standards and Interfaces

Volume

74

Language

English

Usage metrics

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC