Ad Hoc Anonymous Signatures: State of the Art, Challenges and New Directions

Zhiguang Qin, Hu Xiong and Guobin Zhu
University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, Sichuan, China

Series: Cryptography, Steganography and Data Security
BISAC: LAN007000




Digitally watermarked, DRM-free.
Immediate eBook download after purchase.

Product price
Additional options total:
Order total:



As one of the most important group-oriented signatures, ring signatures were initially formalized by Rivet et al. and allows an entity to conscript a group of ring members at will and sign a message in the name of the group without revealing a real identity. Featured with spontaneity and unconditional anonymity, ring signatures have found widespread applications in fair exchange, electronic commerce, wireless sensor networks and vehicular ad hoc networks. A survey of ring signatures is presented in this book to provide researchers and scholars with a better understanding of this primitive cryptography. To be specific, we survey state-of-the-art ring signature schemes insightfully according to the design philosophies of these schemes. The existing schemes have also been classified in view of various perspectives. Furthermore, the security model and efficiency of existing schemes have been compared. On the other hand, the extensions of ring signature schemes, such as proxy ring signature, threshold ring signature, ring signcryption, deniable ring signature, linkable ring signature and conditional anonymous ring signature, are also investigated. Finally, the challenges and future directions of ring signatures, such as the construction with constant-size, the efficiency and provably-secure construction in the standard model, and new application scenarios have also been given.
(Imprint: Nova)

Preface pp. i-xviii


Chapter 1. Introduction

Chapter 2. Formal Definition and Security Model for Ring Signature

Chapter 3. Basic Mathematical Concepts and Properties

Chapter 4. Ring Signature Schemes

Chapter 5. Extensions of Ring Signature

Chapter 6. Applications of Ring Signature

Chapter 7. Conclusion


You have not viewed any product yet.