no polynomial time algorithm can discover the
original signer of σ using the component σ
1
alone.
This ensures that no group of size below t can find
the original signer of a signature σ
1
. Additionally, in
verifiable secret sharing of discrete logarithms, no set
of t − 1 or fewer users can obtain the secret l from σ
2
in polynomial time with non-negligible probability.
Hence l cannot be obtained to find the original signer
of σ
1
, unless a group of at least t users cooperate.
Hence, threshold anonymity holds for the signature
(σ
1
,σ
2
) and theorem 2 holds.
8 CONCLUSIONS AND OPEN
PROBLEMS
Step out ring signatures, introduced in (Klonowski
et al., 2008), had security flaws. We identified those
flaws present in the scheme and fixed them in order
to make it secure. We have introduced the new con-
cept of the Threshold discernible ring signature using
the corrected version of the step out ring signature.
Our scheme is proved secure under DDH assumption.
The problem of finding a scheme which is secure in
the standard model and formulating step out ring sig-
natures using bilinear groups remain open.
REFERENCES
Au, M. H., Chow, S. S. M., Susilo, W., and Tsang, P. P.
(2006). Short linkable ring signatures revisited. In
EuroPKI, pages 101–115. Springer.
Awasthi, A. K. and Lal, S. (2005). Id-based ring signature
and proxy ring signature schemes from bilinear pair-
ings. CoRR.
Camenisch, J. (1997). Efficient and generalized group sig-
natures. In EUROCRYPT, pages 465–479. Springer.
Camenisch, J. and Damgard, I. (2000). Verifiable encryp-
tion, group encryption, and their applications to sepa-
rable group signatures and signature sharing schemes.
In ASIACRYPT, pages 331–345. Springer.
Camenisch, J. and Shoup, V. (2003). Practical verifiable
encryption and decryption of discrete logarithms. In
CRYPTO, pages 126–144. Springer.
Chen, Y.-S., Lei, C.-L., Chiu, Y.-P., and Huang, C.-Y.
(2006). Confessible threshold ring signatures. In
ICSNC ’06: Proceedings of the International Con-
ference on Systems and Networks Communication,
page 25. IEEE Computer Society.
Cheng, W., Lang, W., Yang, Z., Liu, G., and Tan, Y. (2004).
An identity-based proxy ring signature scheme from
bilinear pairings. In ISCC ’04: Proceedings of the
Ninth International Symposium on Computers and
Communications 2004 Volume 2 (ISCC”04), pages
424–429. IEEE Computer Society.
Klonowski, M., Krzywiecki, L., Kutylowski, M., and
Lauks, A. (2008). Step-out ring signatures. In MFCS
’08: Proceedings of the 33rd international symposium
on Mathematical Foundations of Computer Science,
pages 431–442. Springer-Verlag.
Klonowski, M., Krzywiecki, L., Kutyowski, M., and Lauks,
A. (2009). Step-out group signatures. Computing,
85(1-2):137–151.
Naor, M. (2002). Deniable ring authentication. In CRYPTO
’02: Proceedings of the 22nd Annual International
Cryptology Conference on Advances in Cryptology,
pages 481–498. Springer-Verlag.
Pointcheval, D. (2005). Provable security for public key
schemes. In Contemporary Cryptology, pages 133–
190. Birkhuser Basel.
Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How
to leak a secret. In ASIACRYPT ’01: Proceedings of
the 7th International Conference on the Theory and
Application of Cryptology and Information Security,
pages 552–565. Springer-Verlag.
Savola, R. (2006). A requirement centric framework for
information security evaluation. In IWSEC, pages 48–
59. Springer.
Schnorr, C.-P. (1991). Efficient signature generation by
smart cards. J. Cryptology, pages 161–174.
Stadler, M. (1996). Publicly verifiable secret sharing. In
EUROCRYPT, pages 190–199. Springer-Verlag.
Susilo, W. and Mu, Y. (2004). Deniable ring authentication
revisited. In ACNS, pages 149–163. Springer.
Tsang, P. P. and Wei, V. K. (2005). Short linkable ring sig-
natures for e-voting, e-cash and attestation. In ISPEC,
pages 48–60. Springer.
SECRYPT 2010 - International Conference on Security and Cryptography
388