Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

Research Article

Optimistic Fair Exchange of Ring Signatures

Download
377 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-31909-9_13,
        author={Lie Qu and Guilin Wang and Yi Mu},
        title={Optimistic Fair Exchange of Ring Signatures},
        proceedings={Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={10},
        keywords={optimistic fair exchange ring signatures privacy verifiably encrypted signatures (VES)},
        doi={10.1007/978-3-642-31909-9_13}
    }
    
  • Lie Qu
    Guilin Wang
    Yi Mu
    Year: 2012
    Optimistic Fair Exchange of Ring Signatures
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-31909-9_13
Lie Qu1,*, Guilin Wang1,*, Yi Mu1,*
  • 1: University of Wollongong
*Contact email: lq594@uow.edu.au, guilin@uow.edu.au, ymu@uow.edu.au

Abstract

An optimistic fair exchange (OFE) protocol is an effective tool helping two parties exchange their digital items in an equitable way with assistance of a trusted third party, called , who is only required if needed. In previous studies, fair exchange is usually carried out between individual parties. When fair exchange is carried out between two members from distinct groups, anonymity of the signer in a group could be necessary for achieving better privacy. In this paper, we consider optimistic fair exchange of ring signatures (OFERS), i.e. two members from two different groups can exchange their ring signatures in a fair way with ambiguous signers. Each user in these groups has its own public-private key pair and is able to sign a message on behalf of its own group anonymously. We first define the security model of OFERS in the multi-user setting under adaptive chosen message, chosen-key and chosen public-key attacks. Then, based on verifiably encrypted ring signatures (VERS) we construct a concrete scheme by combining the technologies of ring signatures, public-key encryption and proof of knowledge. Finally, we show that our OFERS solution is provably secure in our security model, and preserving of ring signatures. To the best of our knowledge, this is the first (formal) work on this topic.