Skip to main content

How to Leak a Secret and Reap the Rewards Too

  • Conference paper
  • First Online:
Progress in Cryptology - LATINCRYPT 2014 (LATINCRYPT 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8895))

Abstract

We introduce the notion of the designated identity verifier ring signature (DIVRS) and give a generic construction from any given ordinary ring signature scheme. In a DIVRS scheme, the signer \(S\) of a message has the additional capability to prove, at time of his choice, to a designated identity verifier \(V\) that \(S\) is the actual signer without revealing his identity to anyone else. Our definition of a DIVRS retains applicability for all previous applications of a ring signature with an additional capability which can be seen as mix of a designated verifier signature [7] and an anonymous signature [14, 18]. Our generic transformation preserves all the properties of the original ring signature without significant overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566–582. Springer, Heidelberg (2001). 353

    Chapter  Google Scholar 

  2. Bender, A., Katz, J., Morselli, R.: Ring signatures: stronger definitions, and constructions without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 60–79. Springer, Heidelberg (2006). 356

    Chapter  Google Scholar 

  3. Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 465–480. Springer, Heidelberg (2002). 348

    Chapter  Google Scholar 

  4. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991). 348, 351

    Google Scholar 

  5. Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in ad hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 609–626. Springer, Heidelberg (2004). 348

    Chapter  Google Scholar 

  6. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984). 353

    Article  MATH  MathSciNet  Google Scholar 

  7. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996). 348, 350, 351, 359

    Google Scholar 

  8. Klonowski, M., Krzywiecki, Ł., Kutyłowski, M., Lauks, A.: Step-out ring signatures. In: Ochmański, E., Tyszkiewicz, J. (eds.) MFCS 2008. LNCS, vol. 5162, pp. 431–442. Springer, Heidelberg (2008). 352

    Chapter  Google Scholar 

  9. Komano, Y., Ohta, K., Shimbo, A., Kawamura, S.: Toward the fair anonymous signatures: deniable ring signatures. IEICE Trans. 90–A(1), 54–64 (2007). 352

    Article  Google Scholar 

  10. Lee, K.-C., Wen, H.-A., Hwang, T.: Convertible ring signature. IEE Proc. Commun. 152(4), 411–414 (2005). 352

    Article  Google Scholar 

  11. Lv, J., Wang, X.: Verifiable ring signature. In: DMS 2003 - The 9th International Conference on Distribted Multimedia Systems, pp. 663–667 (2003) 351

    Google Scholar 

  12. Naor, M.: Deniable ring authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 481–498. Springer, Heidelberg (2002). 351

    Chapter  Google Scholar 

  13. Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001). 348, 351, 365

    Chapter  Google Scholar 

  14. Saraswat, V., Yun, A.: Anonymous signatures revisited. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol. 5848, pp. 140–153. Springer, Heidelberg (2009). 348, 350, 351

    Chapter  Google Scholar 

  15. Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated-verifier signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 523–542. Springer, Heidelberg (2003). 351

    Chapter  Google Scholar 

  16. Susilo, W., Mu, Y.: Deniable ring authentication revisited. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 149–163. Springer, Heidelberg (2004). 351

    Chapter  Google Scholar 

  17. Xu, S., Yung, M.: Accountable ring signatures: a smart card approach. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., Kalam, A. (eds.) Smart Card Research and Advanced Applications VI. IFIP, vol. 153, pp. 271–286. Springer, New York (2004). 352

    Chapter  Google Scholar 

  18. Yang, G., Wong, D.S., Deng, X., Wang, H.: Anonymous signature schemes. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 347–363. Springer, Heidelberg (2006). 348, 350, 351

    Chapter  Google Scholar 

  19. Zeng, S., Jiang, S., Qin, Z.: A new conditionally anonymous ring signature. In: Fu, B., Du, D.-Z. (eds.) COCOON 2011. LNCS, vol. 6842, pp. 479–491. Springer, Heidelberg (2011). 352

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Saraswat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Saraswat, V., Pandey, S.K. (2015). How to Leak a Secret and Reap the Rewards Too. In: Aranha, D., Menezes, A. (eds) Progress in Cryptology - LATINCRYPT 2014. LATINCRYPT 2014. Lecture Notes in Computer Science(), vol 8895. Springer, Cham. https://doi.org/10.1007/978-3-319-16295-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16295-9_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16294-2

  • Online ISBN: 978-3-319-16295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics