Identity Based Threshold Ring Signature [chapter]

Sherman S. M. Chow, Lucas C. K. Hui, S. M. Yiu
2005 Lecture Notes in Computer Science  
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n − t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we present an identity based (ID-based) threshold ring signature scheme. The scheme is provably secure in the random oracle model and provides trusted
more » ... authority compatibility. To the best of authors' knowledge, our scheme is the first ID-based threshold ring signature scheme which is also the most efficient (in terms of number of pairing operations required) IDbased ring signature scheme (when t = 1) and threshold ring signature scheme from pairings.
doi:10.1007/11496618_17 fatcat:boetdxk4i5dc5lpowm4zpl57qm