2nd International ICST Conference on Security and Privacy in Comunication Networks

Research Article

An Identity-based Ring Signature Scheme with Enhanced Privacy

  • @INPROCEEDINGS{10.1109/SECCOMW.2006.359554,
        author={Chandana  Gamage and Ben Gras and Bruno  Crispo and Andrew S  Tanenbaum},
        title={An Identity-based Ring Signature Scheme with Enhanced Privacy},
        proceedings={2nd International ICST Conference on Security and Privacy in Comunication Networks},
  • Chandana Gamage
    Ben Gras
    Bruno Crispo
    Andrew S Tanenbaum
    Year: 2007
    An Identity-based Ring Signature Scheme with Enhanced Privacy
    DOI: 10.1109/SECCOMW.2006.359554
Chandana Gamage1,*, Ben Gras1,*, Bruno Crispo2,3,*, Andrew S Tanenbaum1,*
  • 1: Vrije Universiteit Amsterdam, The Netherlands
  • 2: Vrije Universiteit Amsterdam, The Netherlands.
  • 3: University of Trento, Italy.
*Contact email: chandag@cs.vu.nl, beng@cs.vu.nl, crispo@cs.vu.nl, ast@cs.vu.nl


There are many applications in which it is necessary to transmit authenticatable messages while achieving certain privacy goals such as signer ambiguity. The emerging area of vehicular ad-hoc network is a good example application domain with this requirement The ring signature technique that uses an ad-hoc group of signer identities is a widely used method for generating this type of privacy preserving digital signatures. The identity-based cryptographic techniques do not require certificates. The construction of ring signatures using identity-based cryptography allow for privacy preserving digital signatures to be created in application when certificates are not readily available or desirable such as in vehicle area networks. We propose a new designated verifier identity-based ring signature scheme that is secure against full key exposure attacks even for a small group size. This is a general purpose primitive that can be used in many application domains such as ubiquitous computing where signer ambiguity is required in small groups. We consider the usefulness of identity-based cryptographic primitives in vehicular ad-hoc networks and use a specific example application to illustrate the use of identity-based ring signatures as a tool to create privacy preserving authenticatable messages