Research on Strongly Unforgeable Ring Signature Scheme Based on ID
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract : A ring signature system is strongly unforgeable if the ring signature is existential unforgeable and, given ring signatures on some message m, the adversary can not produce a new ring signature on m. Strongly unforgeable ring signatures are useful for constructing chosen-ciphertext secure cryptographic system. For example, it can be used to design the ring signcryptionscheme.In this paper, we analyse the safety of Au et al.'s ID-based ring signature scheme, then we construct a strongly unforgeable ID-based ring signature scheme in the standard model based on the standard discrete logarithm problem (DLP).
Authors and Affiliations
Gang Zeng
Importance of Mean Shift in Remote Sensing Segmentation
The segmentation of an image can be considered as a preprocessing step for many of the algorithms such as object detection and identification. Many algorithms exist in the field of remote sensing for segmentati...
Context Based Indexing in Search Engines Using Ontology:Review
Abstract: Nowadays, the World Wide Web is the collection of large amount of information which is increasingday by day. For this increasing amount of information, there is a need for efficient and effective index st...
A Hybrid Evolutionary Optimization Model for Solving Job Shop Scheduling Problem using GA and SA
Abstract: The heuristic optimization techniques were commonly used in solving several optimization problems. The present work aims to develop a hybrid algorithm to solve the scheduling optimization problem of JSSP. There...
Selection of Legendre Moments for Content Based Image Retrieval Using ACO Based Algorithm
Abstract : Feature selection is an important step in Content Based Image Retrieval (CBIR) which has a great impact on reducing complexity and increasing efficiency of CBIR frameworks. Swarm Intelligence (SI) methods, as...
Pattern Analytical Module for EDOS Attacker Recognition
Abstract: Cloud computing has provided a platform to its users where they are charged on the basis of usage of the cloud resources; this is known as “pay-as-you-use”. Today, Cloud computing is the most hyped techno...