Deniable Ring Signatures
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/41671 |
_version_ | 1826201560040865792 |
---|---|
author | Reich, Eitan |
author2 | Silvio Micali. |
author_facet | Silvio Micali. Reich, Eitan |
author_sort | Reich, Eitan |
collection | MIT |
description | Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007. |
first_indexed | 2024-09-23T11:53:21Z |
format | Thesis |
id | mit-1721.1/41671 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T11:53:21Z |
publishDate | 2008 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/416712019-04-11T04:21:52Z Deniable Ring Signatures Reich, Eitan Silvio Micali. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007. Includes bibliographical references (p. 55-57). Ring Signatures were developed by Rivest, Shamir and Tauman, in a paper titled How to Leak a Secret, as a cryptographically secure way to authenticate messages with respect to ad-hoc groups while still maintaining the signer's anonymity. While their initial scheme assumed the existence of random oracles, in 2005 a scheme was developed that does not use random oracles and meets the strongest security definitions known in the literature. We argue that this scheme is not deniable, meaning if someone signs a message with respect to a ring of possible signers, and at a later time the secret keys of all of the possible signers are confiscated (including the author), then the author's anonymity is no longer guaranteed. We propose a modification to the scheme that guarantees anonymity even in this situation, using a scheme that depends on ring signature users generating keys that do not distinguish them from other users who did not intend to participate in ring signature schemes, so that our scheme can truly be called a deniable ring signature scheme. by Eitan Reich. M.Eng. 2008-05-19T16:07:24Z 2008-05-19T16:07:24Z 2007 2007 Thesis http://hdl.handle.net/1721.1/41671 220931319 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 57 p. application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Reich, Eitan Deniable Ring Signatures |
title | Deniable Ring Signatures |
title_full | Deniable Ring Signatures |
title_fullStr | Deniable Ring Signatures |
title_full_unstemmed | Deniable Ring Signatures |
title_short | Deniable Ring Signatures |
title_sort | deniable ring signatures |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/41671 |
work_keys_str_mv | AT reicheitan deniableringsignatures |