Deniable Ring Signatures

Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.

Bibliographic Details
Main Author: Reich, Eitan
Other Authors: Silvio Micali.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2008
Subjects:
Online Access:http://hdl.handle.net/1721.1/41671
_version_ 1826201560040865792
author Reich, Eitan
author2 Silvio Micali.
author_facet Silvio Micali.
Reich, Eitan
author_sort Reich, Eitan
collection MIT
description Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.
first_indexed 2024-09-23T11:53:21Z
format Thesis
id mit-1721.1/41671
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T11:53:21Z
publishDate 2008
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/416712019-04-11T04:21:52Z Deniable Ring Signatures Reich, Eitan Silvio Micali. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007. Includes bibliographical references (p. 55-57). Ring Signatures were developed by Rivest, Shamir and Tauman, in a paper titled How to Leak a Secret, as a cryptographically secure way to authenticate messages with respect to ad-hoc groups while still maintaining the signer's anonymity. While their initial scheme assumed the existence of random oracles, in 2005 a scheme was developed that does not use random oracles and meets the strongest security definitions known in the literature. We argue that this scheme is not deniable, meaning if someone signs a message with respect to a ring of possible signers, and at a later time the secret keys of all of the possible signers are confiscated (including the author), then the author's anonymity is no longer guaranteed. We propose a modification to the scheme that guarantees anonymity even in this situation, using a scheme that depends on ring signature users generating keys that do not distinguish them from other users who did not intend to participate in ring signature schemes, so that our scheme can truly be called a deniable ring signature scheme. by Eitan Reich. M.Eng. 2008-05-19T16:07:24Z 2008-05-19T16:07:24Z 2007 2007 Thesis http://hdl.handle.net/1721.1/41671 220931319 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 57 p. application/pdf Massachusetts Institute of Technology
spellingShingle Electrical Engineering and Computer Science.
Reich, Eitan
Deniable Ring Signatures
title Deniable Ring Signatures
title_full Deniable Ring Signatures
title_fullStr Deniable Ring Signatures
title_full_unstemmed Deniable Ring Signatures
title_short Deniable Ring Signatures
title_sort deniable ring signatures
topic Electrical Engineering and Computer Science.
url http://hdl.handle.net/1721.1/41671
work_keys_str_mv AT reicheitan deniableringsignatures