@inproceedings{ebb2126ca3ff48beb5675d2ec2744a63,
title = "A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract)",
abstract = "Since the introduction of Identity-based (ID-based) cryptography by Shamir in 1984, numerous ID-based signature schemes have been proposed. In 2001, Rivest et al. introduced ring signature that provides irrevocable signer anonymity and spontaneous group formation. In recent years, ID-based ring signature schemes have been proposed and almost all of them are based on bilinear pairings. In this paper, we propose the first ID-based threshold ring signature scheme that is not based on bilinear pairings. We also propose the first ID-based threshold 'linkable' ring signature scheme. We emphasize that the anonymity of the actual signers is maintained even against the private key generator (PKG) of the ID-based system. Finally we show how to add identity escrow to the two schemes. Due to the different levels of signer anonymity they support, the schemes proposed in this paper actually form a suite of ID-based threshold ring signature schemes which is applicable to many real-world applications with varied anonymity requirements. {\textcopyright} 2010 Springer-Verlag.",
author = "Tsang, {Patrick P.} and Au, {Man Ho} and Liu, {Joseph K.} and Willy Susilo and Wong, {Duncan S.}",
year = "2010",
doi = "10.1007/978-3-642-16280-0_11",
language = "English",
isbn = "3642162797",
volume = "6402 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "166--183",
booktitle = "Provable Security",
address = "Germany",
note = "4th International Conference on Provable Security, ProvSec 2010 ; Conference date: 13-10-2010 Through 15-10-2010",
}