Efficient Identity-Based Ring Signature Scheme With Anonymity And System Thereof

ABSTRACT

An identity-based ring signature authentication method provides an efficient identity-based ring signature method, which has a constant number of bilinear pairing computations independent the number of ring members in a verification process. The method does not use a special type of function, e.g., MapToPoint.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority under 35 U.S.C. §119(a) from KoreanPatent Application No. 10-2010-127205 filed on Dec. 13, 2010, thedisclosure of which is hereby incorporated by reference in its entirety.

BACKGROUND

Embodiments of the present inventive concepts relate to anidentity-based ring signature scheme, and more particularly, to anefficient identity-based ring signature scheme having a constant numberof bilinear pairing computations independent the number of ring membersin a verification process and a system performing the method.

A ring signature is a method where a signer composes a group or a ringincluding him or herself and signs on an arbitrary message by using allof the user's own secret key and a public key of each of other membersin the group.

The verification of ring signature may be convinced that the givensignature is generated by one of members consisting the ring, but itdoes not reveal exactly which member of that. Accordingly, a ringsignature offers anonymity.

After a concept of ring signature is first proposed by Rivest, Shamirand Tauman in 2001, various ring signature schemes are proposed.

In a public key cryptosystem, a user generally has two keys, e.g., asecret key and a public key. What connects the public key with identityof the public key owner and confirms validity of the public key is adigital signature type of public key certificate on which a certificateauthority (CA). In a conventional traditional certificate-based system,each of users have computational complexity to register his public keyand verify the validity of a corresponding public key all the timebefore using the other's public key and the conventional public keysystem has the issue of key management that is somewhat complex.

Since an identity-based ring signature scheme of Zhang and Kim using abilinear pairing is proposed in 2002, a lot of identity-based ringsignature schemes are proposed. However, the proposed schemes have afeature that bilinear pairing a number of pairing computation increasesin proportion to the number of ring members during verification, so thatit is considerably inefficient. A bilinear pairing computation on anelliptic curve needs the most time and costs in spite of development ofan implementation technology and a computer.

SUMMARY

The present general inventive concept provides an efficientidentity-based ring signature method, which has a constant number ofpairing computation independent the number of ring members in averification process and does not use a special type of function, e.g.,MapToPoint, and a system performing the method.

An example embodiment of the present inventive concepts is directed toan identity-based ring signature method, including generating, by aprivate key generator, a secret key S_(t) by using public parameters (q,G₁, G₂, e, P, P_(pub), g, H₁, H₂) and identity received from a terminalof a t^(th) user and transmitting the generated secret key S_(t) to aterminal of the user, setting, by the terminal, (n−1) values (V₁, V₂, .. . , V_(t−1), . . . , V_(t+1), . . . , V_(n)) by choosing an arbitraryrandom value and generating a first digital signature U on a message mby using the public parameters, the secret key S_(t), a set (L={ID₁, . .. , ID_(n)}) of identities of ring members including identity ID_(t) ofthe user, and the (n−1) values, generating a digital signature V_(t) ofthe user by using the first digital signature U, the message m, the setLs and the secret key S_(t), generating a plurality second digitalsignature including the (n−1) values used to generate the first digitalsignature U and the digital signature V_(t) of the user, and generatinga ring signature τ including the first digital signature U and theplurality of second digital signature, receiving, by an authenticationserver, the set L, the message m and the ring signature τ on the messagem from the terminal and verifying validity of the received ringsignature τ by using the public parameters.

The public parameters include an elliptic curve group G₁ and amultiplicative subgroup G₂ of finite fields, each of G₁ and G₂ denotes agroup of prime order q, a bilinear pairing e, a generator P of the G1, apublic key (P_(pub)=s·P) which is a scalar multiplication of the P and amaster secret key s of the private key generator, a result (g=e(P, P))of the bilinear pairing e taking as an input the generator P, a firsthash function H₁, and a second hash function H₂.

The secret key S_(t) is generated by using an output (q_(t)=H₁(ID_(t)))of the first hash function H₁ taking as an input the identity ID_(t),the master secret key s and the generator P.

The secret key S_(t) is generated according to an equation of

$S_{t} = {\frac{1}{s + q_{t}}{P.}}$

The first hash function H₁ maps to an arbitrary bit string to a point onan integer set Zq, wherein the master secret key s is a random numberchosen by the private key generator, wherein Z_(q) denotes a set ofremainders after dividing integers by the prime order q.

The generating the first digital signature includes choosing (n−1)random points V_(i) (1≦i≦n, i≠t) from the G₁, computing a first hashvalue (q_(i)=H₁(ID_(i))) of the first hash function H₁ on each identityID_(i) wherein the ID_(i) is an element of the set L, choosing a randomnumber r, computing a value g^(r), where the g is raised to a power r, afirst bilinear pairing result

$e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{Pub}} \right)$

with inputs an addition

$\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}$

of (n−1) random points V_(i) and the public key P_(pub), and a secondbilinear pairing result

$e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)$

with inputs an addition

$\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}$

of a scalar multiplication of the V_(i) by the q_(i) and the generatorP, and generating the first digital signature U satisfying an equationof

$U = {g^{r} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)}}$

by using the value g^(r), the first bilinear pairing result and thesecond bilinear pairing result.

The digital signature V_(t) of the user is generated according to anequation of V_(i)=[r+H₂(m, U, L)]S_(t) which is a scalar multiplicationof (r+H₂(m, U, L)) by the secret key S_(t), wherein (r+H₂(m, U, L) is anaddition of the random number r and a second hash value (h=H₂(m, U, L))over an integer set Z_(q), wherein the second hash value (h=H₂(m, U, L))of the second hash function H₂ which takes as inputs the message m, thefirst digital signature U and the set L.

The verifying the validity of the ring signature includes receiving thepublic parameters, the set L, the message m and the ring signature τ onthe message m, computing the first hash value (q_(i)=H₁(ID_(i))) withinput an identity ID_(i) included in the set L, computing the secondhash value (h=H₂(m, U, L)) with inputs the message m, the first digitalsignature U and the set L, computing a first bilinear pairing value

$e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)$

with inputs a value

$\sum\limits_{i = 1}^{n}V_{i}$

and the public key P_(pub), wherein the value

$\sum\limits_{i = 1}^{n}V_{i}$

is an addition of the plurality of second digital signature, computing asecond bilinear pairing value

$e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)$

with inputs a value

$\sum\limits_{i = 1}^{n}{q_{i}V_{i}}$

and the generator P, wherein the value

$\sum\limits_{i = 1}^{n}{q_{i}V_{i}}$

is an addition of a scalar multiplication of the V_(i) by the q_(i),computes a first output value

${e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}$

which is a multiplication of the first bilinear pairing value and thesecond bilinear pairing value, computing a second output value U·g^(h)which is a multiplication of the first digital signature U and a valueg^(h), where the g is raised to a power h, and verifying the validity ofthe ring signature τ according to a result of comparing the first outputvalue with the second output value, and outputting an accept signal whenthe first output value equals second output value and outputting areject signal otherwise.

Here, each of

$\sum\limits_{i = 1}^{n}{V_{i}\mspace{14mu} {and}\mspace{14mu} {\sum\limits_{i = 1}^{n}{q_{i}V_{i}}}}$

is addition operations in the G₁,

${e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}$

is a multiplication operation in the G₂, and U·g^(h) is a multiplicationoperation over the G2.

An example embodiment of the present invention is directed to a systemperforming an identity-based ring signature authentication method,including a private key generator, an user terminal and anauthentication server.

BRIEF DESCRIPTION OF THE DRAWINGS

These and/or other aspects and advantages of the present generalinventive concept will become apparent and more readily appreciated fromthe following description of the embodiments, taken in conjunction withthe accompanying drawings of which:

FIG. 1 is a block diagram of an identity-based ring signatureauthentication system according to an example embodiment of the presentinvention;

FIG. 2 is a flowchart to explain an authentication method for theidentity-based ring signature authentication system illustrated in FIG.1.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Reference will now be made in detail to the embodiments of the presentgeneral inventive concept, examples of which are illustrated in theaccompanying drawings, wherein like reference numerals refer to the likeelements throughout. The embodiments are described below in order toexplain the present general inventive concept by referring to thefigures.

As an example of mathematical symbols and notations, a prime denotes anatural number greater than 1 that has no divisors other than 1 anditself, Z_(q) denotes a set of the remainders after dividing integer bya prime q, and Z_(q) is represented by {0, 1, 2, . . . , q−1}.

Z_(q)* is a set where an element ‘0’ is excluded from the set Z_(q) andrepresented by

Z _(q)*={1, 2, . . . , q−1}.

f: X→Y is a function from a domain X to a co-domain Y and denotes that adomain is a set of X and a co-domain is a set of Y. f(x)=y means that anelement x of the set of X maps to an element y of the set of Y by afunction f.

FIG. 1 is a block diagram of an identity-based ring signatureauthentication system according to an example embodiment of the presentinvention, and FIG. 2 is a data flowchart to explain an authenticationmethod for the identity-based ring signature authentication systemillustrated in FIG. 1.

Referring to FIGS. 1 and 2, the identity-based ring signatureauthentication system 10 includes a private key generator (PKG) 20, at^(th) user terminal 30 and an authentication server 40.

The private key generator 20 includes a public parameter generationmodule 23, a transceiver module 25 and a secret key generation module27.

Each component 23, 25 and 27 of the private key generator 20 isdisplayed separately in a drawing to indicate that it may be separatedfunctionally and logically; however, it does not mean that it should bea separate component or embodied in a separate code.

A module in the present invention may mean hardware which may perform afunction and an operation according to each title explained in thepresent invention, a computer program code which may perform a specificfunction and operation, or an electronic recording medium, e.g., aprocessor, where the computer program code performing a specificfunction and operation is installed.

In other words, a module may mean a functional and/or a structuralcombination of hardware for performing a technical concept of thepresent invention and/or software for driving the hardware.

The public parameter generation module 23 generates a set of publicparameters Params in a system setting phase.

The set of public parameters Params denote parameter values publishedfor a user of the user terminal 30 and an authentication server 40explained later to use them, and include each public parameter asfollows.

Params=<q, G₁, G₂, e, P, P_(pub), g, H₁, H₂>

The q denotes a prime, and each of the G₁ and G₂ denote a group of primeorder q.

Here, the G₁ denotes an elliptic curve group and the G₂ denotes amultiplicative subgroup of a finite field.

e:G₁×G₁→G₂ denotes a bilinear pairing satisfying bilinearity andnon-degeneracy.

The bilinearity and the non-degeneracy which the bilinear pairing esatisfies are as follows.

Bilinearity: For all Q and R which belong to G₁ (Q, RεG₁) and all a andb which belong to Z (a, bεZ), the bilinear pairing satisfies e(aQ,bQ)=e(Q, R)^(ab).

Non-degeneracy: For a point QεG₁. The bilinear pairing satisfies e(Q,Q)≠1.

The P is a generator of the G₁ and the public key P_(pub) is a publickey, where a value is a scalar multiplication of the generator P and amaster secret key s of the private key generator 20, i.e., P_(pub)=s·P.That is, the public parameter generation module 23 computes P_(pub)=s·Pby selecting an arbitrary random number sεZ_(q)* and computes a resultvalue g of a bilinear pairing e taking as an input the generator P,i.e., g=e(P, P).

Here, the master secret key s is a random number selected by the privatekey generator 20 as secret information which the private key generator20 only knows, and used in generating each secret key (e.g., a secretkey S_(t) of a t^(th) user) of a plurality of users in a system 10.

The public key P_(pub) is published to all users in the system as apublic parameter; wherein it is hard to know the master secret key ssatisfying the public key P_(pub)=s·P. Such a mathematical problem iscalled an elliptic curve discrete logarithm problem (ECDLP) on anelliptic curve, the master secret key s is only known to the private keygenerator 20 which generates it, on the other hand the public keyP_(pub) as the public parameter is published to all users in the system.

The first hash function H₁ may be one of Secure Hash Algorithm (SHA)-1,SHA-224, SHA-256, SHA-384 and SHA-512, which are hash functions definedin FIPS 180-3 of ANSI, as a function H₁ maps an arbitrary bit string,e.g., identity of an user, to a point in an integer set Z_(q), whereZ_(q) is the set of the remainders obtained from dividing integers by aprime order q.

The second hash function H₂ is a function mapping an arbitrary bitstring to an element in a set Z_(q).

According to an example embodiment, the second hash function H₂ may be afunction defined in FIPS 180-3 of ANSI like the first hash function H₁.

The first hash function H₁ and the second hash function H₂ may berepresented by the following mathematical equation.

H₁:{0,1}*→Z_(q)H₂:{0,1}*→Z_(q)

The transceiver module 25 denotes hardware or software performing afunction of controlling to perform radio communication with a pluralityof user terminals, e.g., the user terminal 30, by using not only awire-based communication standard but also Wi-Fi, Bluetooth or a relatedwireless communication standard.

The transceiver module 25 of the private key generator 20 receivesidentity (information) ID_(t) from the t^(th) user terminal 30 (S10).

The identity ID_(t) of the t^(th) user may include any information ofdistinguishing the user, such as an e-mail address of the user using thet^(th) user terminal 30, a number of a mobile device and an internetprotocol (IP) address.

The identity ID_(t) is used after being converted to an arbitrary bitstring.

The secret key generation module 27 generates a secret key S_(t) byusing a set of public parameters Params based on the identity ID_(t)received from the user terminal 30 (S30).

The generation of a secret key S_(t) which is processed by the secretkey generation module 27 is as follows.

The secret key generation module 27 computes a first hash value q_(t) byusing a first hash function H₁, which takes as an input the identityID_(t) (e.g., an arbitrary string indicating identification of a t^(th)user, ID_(t)ε{0,1}) (S20).

The first hash value: q_(t)=H₁(ID_(t))εZ_(q)

The secret key generation module 27 generates a secret key S_(t) byusing a master secret key s of the private key generator 20 and morespecifically, the secret key S_(t) represented by the equation 1 is thescalar multiplication of the generator P for a reciprocal of theaddition of the master secret key s and the first hash value q_(t)(S30).

$\begin{matrix}{S_{t} = {\frac{1}{s + q_{t}}P}} & \left\lbrack {{Equation}\mspace{14mu} 1} \right\rbrack\end{matrix}$

As indicated in the equation 1, the secret key S_(t) is generated by theprivate key generator 20 as a secret key of a user participating in anidentity-based ring signature and denotes a secret key of a t^(th) user,i.e., an t^(th) user with an identity ID_(t).

The transceiver module 23 of the private key generator 20 transmits agenerated secret key S_(t) to the terminal 30 of the t^(th) user withthe identity ID_(t) through a secure channel (S40).

According to an example embodiment, the secure channel may be embodiedthrough a secure socket layer (SSL)/transport layer security (TLS).

The SSL/TLS, as one of private information security protocols developedto overcome a problem that an inte et protocol is not able to retainconfidentiality in terms of security, is used widely to retain privateinformation and credit card information security required for internetcommercial transaction.

Moreover, the transceiver module 25 of the private key generator 20transmits a set of public parameters Params to the authentication server40.

The user terminal 30 includes a transceiver module 33 and a signaturegeneration module 35.

The user terminal 30 denotes all communication terminals which maytransmit or receive data to/from the private key generator 20 through awire-based communication network or a wireless communication network.

According to an example embodiment, the user terminal 30 may denote acommunication terminal such as a personal computer (PC), a portablecomputer, a tablet PC, a mobile phone, a smart phone or a personaldigital assistant (PDA).

The transceiver module 33 of the user terminal 30 receives the secretkey S_(t) from the private key generator 20, and a signature generationmodule 35 generates a ring signature (τ=(U, V₁, . . . , V_(n)) includinga first part, i.e., a first digital signature U and a second part (V₁, .. . , V_(n)), i.e., a plurality of second digital signature of the ringsignature on a message m to be signed (S100).

For example, the signature generation module 35 generates anidentity-based ring signature τ on a message m by using a message m tobe signed, a secret key S_(t) of the user with the identity ID_(t), thegenerator P, the public key P_(pub) and the second hash function H₂which come from the set of the public parameter Params, where the useridentity ID_(t) is included in a set L of identities of ring members(S100).

A generation of the ring signature τ is performed as follows.

L={ID₁, . . . , ID_(n)} indicates a set of identities of a ring memberswho compose the ring signature, i.e., a plurality of users. Identity ofa real signer belongs to the set L of identities of ring members, andthe ring signature τ is generated by a user with the identity ID_(t),where the ID_(t) is one of identities from the set L of users'identities composing the ring signature. Here, the t^(th) identityID_(t) is included in the L as discrimination information of the signergenerating the ring signature τ.

The signature generation module 35 sets (n−1) values (V₁, V₂, . . . ,V_(t−1), V_(t+1), . . . , V_(n)) by selecting an arbitrary random valueand generates term U on a message m according to an equation 2 by usinga set (q, G₁, G₂, e, P, P_(pub), g, H₁, H₂) of public parameters Params,a secret key S_(t), a set L of identities of ring members and the (n−1)values (V₁, V₂, . . . , V_(t−1), V_(t+1), . . . , V_(n)) (S80).

The signature generation module 35 generating a first ring signaturetent, U selects (n−1) random points (V_(i)εG₁, only i=1, 2, 3, . . . ,t−1, t+1, n) randomly in an elliptic curve group G₁ of prime order q,computes (n−1) first hash values (q_(i)=H₁(ID_(i)) taking as an inputidentities ID_(i) of ring members included in the set L (S70), chooses arandom number r, computes a value g^(r) and a first result value

$\left( {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{Pub}} \right)} \right)$

of bilinear pairing taking as inputs an addition

$\left( {\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}} \right)$

of the (n−1) random points V_(i) and the public key P_(pub) and a secondresult value

$\left( {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)} \right)$

of bilinear pairing taking as inputs a scalar multiplication of the hashvalues q_(i) and the random points V_(i) (1≦i≦n, i≠t), and the generatorP, and finally outputs the first term, i.e., a first digital signature Uof ring signature according to an equation 2.

$\begin{matrix}{U = {g^{r} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)}}} & \left\lbrack {{Equation}\mspace{14mu} 2} \right\rbrack\end{matrix}$

The signature generation module 35 generates the digital signatureV_(t), which is the second part of ring signature, using the previouscomputed value U, a message m, a list of identities of ring members, andthe secret key S_(t) (S90).

The digital signature V_(t) of an user is generated as followingsteps: 1) computing the second hash value (h=H₂(m, U, L)) taking asinputs a message m, the first term U of ring signature, and the set L ofidentities of ring members, and 2) computing an addition [r+H₂(m, U, L)]of the random number r and the second hash value (h=H₂(m, U, L)) on aset Z_(q) and the scalar multiplication of [r+H₂(m. U, L)] by the usersecret key S_(t) in G₁. That is, the signature generation module 35generates the digital signature V_(t)=[r+H₂(m. U, L)]S_(t) by using asecret key S_(t) received from the secret key generator 20 (S90).

The V_(i)(V₁, . . . , V_(t−1), V_(t+1), . . . , V_(n)) are (n−1) randomvalues selected in G₁ when the first term U of ring signature.

In addition, the signature generation module 35 generates a plurality ofpart (V₁, V₂, . . . , V_(t−1), V_(t), V_(t+1), . . . , V_(n)) of ringsignature by using (n−1) values (V₁, V₂, . . . , V_(t−1), V_(t+1), . . ., V_(n)), which are used to generate the first digital signature U, andthe value V_(t) generated by the user with the identity ID_(t) (S60).

The signature generation module 35 outputs a ring signature τ includingthe first digital signature U and the second part (V₁, V₂, . . . ,V_(t−1), V_(t), V_(t+1), . . . , V_(n)) of the ring signature (S100).

The transceiver module 33 of the user terminal 30 transmits m, L, and τto the authentication server 30 (S110).

For convenience of explanation, FIG. 1 illustrates only a user terminal30; however, the user terminal 30 may be multiple.

The authentication server 40 includes a transceiver module 43 and averification module 45.

Each component of the authentication server 40 is displayed on a drawingseparately to show it may be separated functionally and/or logically;however, it doesn't mean that it should be a separate component orembodied in a separate code physically.

The transceiver module 43 receives a message m, a set L of identities ofring members and a ring signature ti from the user terminal 30.

The verification module 45 of the authentication server 40 includes anoperation module 46 and a comparison module 48.

The verification module 45 verifies the validity of the ring signature τbased on a message m, a set L of identities of ring members taking asinputs (m, L, τ), where V₁, . . . , V_(n)).

The verification step for the validity of a ring signature τ isperformed by the verification module 45 as follows:

The operation module 46 of the verification module 45 receiving a set ofpublic parameters Params, a set L, and first digital signature U,performs the following steps: 1) computing two hash valuesq_(i)=H₁(ID_(i)) and h=H₂(m, U, L); 2) computing two bilinear pairings

${e_{1} = {{{e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)}\mspace{14mu} {and}\mspace{14mu} e_{2}} = {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}}},$

and the first output value

${{e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}},$

which is a multiplication of the two values e₁ and e₂ (S130); and 3)finally outputting the second output value (U·g^(h)) (S150).

Here, each of

$\sum\limits_{i = 1}^{n}{V_{i}\mspace{14mu} {and}\mspace{14mu} {\sum\limits_{i = 1}^{n}{q_{i}V_{i}}}}$

is an addition operation over the elliptic curve group G₁, the

${e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}$

is a multiplication operation over the multiplicative subgroup G₂, andU·g^(h) is a multiplication operation over the multiplicative subgroupG₂.

The comparison module 48 verifies validity of a ring signature τ bycomparing the first output value and the second output value. Forexample, when the first output value equals the second output value, thecomparison module 48 determines that the ring signature τ is valid. Forexample, when the first output value equals the second output value thecomparison module 48 outputs an accept signal, otherwise the comparisonmodule 48 outputs a reject signal.

The comparison module 48 determines whether an equation 3 is satisfiedas described above, and outputs whether the ring signature τ is valid orinvalid according to the comparison result (S200).

$\begin{matrix}{{\prod\limits_{i = 1}^{n}{e\left( {V_{i},{P_{pub} + {q_{i}P}}} \right)}} = {{{e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}} = {U \cdot g^{h}}}} & \left\lbrack {{Equation}\mspace{14mu} 3} \right\rbrack\end{matrix}$

The above equation 3 is stated as an equation 4 in more detail.

$\begin{matrix}{{{e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}} = {{{e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)} \cdot {e\left( {V_{t},P_{pub}} \right)} \cdot {e\left( {{q_{t}V_{t}},P} \right)}} = {{{e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)} \cdot {e\left( {V_{t},{sP}} \right)} \cdot {e\left( {V_{t},{q_{t}P}} \right)}} = {{{e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)} \cdot {e\left( {V_{t},{\left( {s + q_{t}} \right)P}} \right)}} = {{{e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)} \cdot {e\left( {{\left( {r + h} \right)\frac{1}{s + q_{t}}P},{\left( {s + q_{t}} \right)P}} \right)}} = {{g^{r} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)} \cdot g^{h}} = {U \cdot g^{h}}}}}}}} & \left\lbrack {{Equation}\mspace{14mu} 4} \right\rbrack\end{matrix}$

It is possible that a ring signature authentication method according toan example embodiment of the present invention is embodied in acomputer-readable code in a computer-readable recording medium.

A computer-readable recording medium includes all kinds of recordingdevices where computer system-readable data are stored. As an example ofthe computer-readable recording medium, there are a USB storage device,a ROM, a RAM, a CD-ROM, a magnetic tape, a hard disk, a floppy disk, andan optical data storage device. In addition, the computer-readablerecording medium is dispersed to a computer system connected to network,so that a computer-readable code may be stored and perfoinied in adisperse manner. A functional program, a code and code segments forembodying the present invention may be inferred easily by programmers inthe art where the present invention belongs.

An identity-based ring signature authentication method of the presentinvention may vary a ring signature having a constant number of pairingcomputations independent of the ring members.

An identity-based ring signature authentication method of the presentinvention may generate a ring signature by applying not a special typeof function (MapToPoint) but a general hash function and verify thegenerated ring signature, so that it may be applied widely.

Although a few embodiments of the present general inventive concept havebeen shown and described, it will be appreciated by those skilled in theart that changes may be made in these embodiments without departing fromthe principles and spirit of the general inventive concept, the scope ofwhich is defined in the appended claims and their equivalents.

1. An identity-based ring signature authentication method comprising:generating, by a private key generator, a secret key S_(t) by usingpublic parameters (q, G₁, G₂, e, P, P_(pub), g, H₁, H₂) and identityID_(t) received from a t^(th) user terminal and transmitting thegenerated secret key S_(t) to the t^(th) user terminal; setting, by theterminal, (n−1) values (V₁, V₂, . . . , V_(t−1), V_(t+1), . . . , V_(n))by choosing an arbitrary random value and generating a first digitalsignature U on a message m by using the public parameters, the secretkey S_(t), a set (L={ID₁, . . . , ID_(n)}) of identities of ring membersincluding the identity ID_(t) of a t^(th) user and the (n−1) values;generating a digital signature V_(t) of the t^(th) user by using thefirst digital signature U, the message m, the set L and the secret keyS_(t); generating, a plurality of second digital signature including the(n−1) values used to generate the first digital signature U and thedigital signature V_(t) of the t^(th) user; generating, a ring signatureτ including the first digital signature U and the plurality of seconddigital signature; and receiving, by an authentication server, the setL, the message m and the ring signature τ on the message m from thet^(th) user terminal and verifying validity of the received ringsignature τ by using the public parameter, wherein the public parametersinclude an elliptic curve group G₁ and a multiplicative subgroup G₂ of afinite field, each of the G₁ and G₂ denotes a group of prime order q, abilinear pairing e, a generator P of the G₁, a public key P_(pub) (=s·P)which is a scalar multiplication of the generator P and a master secretkey s of the private key generator, a result (g=e(P, P)) of the bilinearpairing e taking as an input the generator P, a first hash function H₁and a second hash function H₂.
 2. The method of claim 1, wherein thesecret key S_(t) is generated by using an output (q_(t)=H₁(ID_(t))) ofthe first hash function H₁ taking as inputs the identity ID_(t), themaster secret key s and the generator P.
 3. The method of claim 2,wherein the secret key S_(t) is generated according to an equation of$S_{t} = {\frac{1}{s + q_{t}}{P.}}$
 4. The method of claim 2, whereinthe first hash function H₁ maps an arbitrary bit string to a point in aset Z_(q), wherein the master secret key s is a random number chosen bythe private key generator, wherein the Z_(q) denotes a set of remaindersafter dividing integers by the prime order q.
 5. The method of claim 1,wherein the generating the first digital signature U comprises: choosing(n−1) random points V_(i)(1≦i≦n, i≠t) from the G₁; computing a firsthash value (q_(i)=H₁(ID_(i))) of the first hash function H₁ on eachidentity ID_(i), wherein the identity ID_(i) is an element of the set L;choosing a random number r; and computing a value g^(r) where the g israised to a power r, a first bilinear pairing result$e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{Pub}} \right)$with inputs an addition $\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}$ ofthe (n−1) random points V_(i) and the public key P_(pub), and a secondbilinear pairing result$e\left( {\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}P}} \right)$with inputs an addition$\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}$ of a scalarmultiplication of the V_(i) by the q_(i) and the generator P, andgenerating the first digital signature U satisfying an equation of$U = {g^{r} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)}}$by using the value g^(r), the first bilinear pairing result and thesecond bilinear pairing result.
 6. The method of claim 5, wherein thedigital signature V_(t) of the t^(th) user is generated according to anequation of V_(t)=[r+H₂(m, U, L)]S_(t) which is a scalar multiplicationof (r+H₂(m, U, L)) by the secret key S_(t), wherein the (r+H₂(m, U, L))is an addition of the random number r and a second hash value (h=H₂(m,U, L)) over an integer set Z_(q), wherein the second hash value (h=H₂(m,U, L)) is an output of the second hash function H₂ which takes as inputsthe message m, the first digital signature U and the set L.
 7. Themethod of claim 6, wherein the verifying the validity of the ringsignature comprises: receiving the public parameters, the set L, themessage m and the ring signature τ on the message m; computing the firsthash value (q_(i)=H₁(ID_(i))) with input identity ID_(i) included in theset L; computing the second hash value (h=H₂(m, U, L)) with inputs themessage m, the first digital signature U and the set L; computing afirst bilinear pairing value$e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)$ with inputsa value $\sum\limits_{i = 1}^{n}V_{i}$ and the public key P_(pub),wherein the value $\sum\limits_{i = 1}^{n}V_{i}$ is an addition of theplurality of second digital signature (V₁, . . . , V_(t), . . . ,V_(n)), computing a second bilinear pairing value$e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)$ withinputs an value $\sum\limits_{i = 1}^{n}{q_{i}V_{i}}$ and thegenerator P, wherein the value $\sum\limits_{i = 1}^{n}{q_{i}V_{i}}$is an addition of a scalar multiplication of the V_(i) by the q_(i), andcomputing a first output value${e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}$which is a multiplication of the first bilinear pairing value and thesecond bilinear pairing value; computing a second output value (U·g^(h))which is a multiplication of the first digital signature U and a valueg^(h) where the g is raised to a power h; and verifying the validity ofthe ring signature ti according to a result of comparing the firstoutput value with the second output value, and outputting an acceptsignal when the first output value equals second output value andoutputting a reject signal otherwise, wherein each of$\sum\limits_{i = 1}^{n}{V_{i}\mspace{14mu} {and}\mspace{14mu} {\sum\limits_{i = 1}^{n}{q_{i}V_{i}}}}$is an addition operation in the G₁, the${e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}$is a multiplication operation in the G₂, and the U·g_(h) is amultiplication operation over the G₂.
 8. A recording medium where acomputer system for performing an identity-based ring signatureauthentication method of claim 1 is recorded.
 9. An identity-based ringsignature authentication system comprising: a terminal of a t^(th) user;a private key generator for generating a secret key S_(t) by usingpublic parameters (q, G₁, G₂, e, P, P_(pub), g, H₁, H₂) and identityID_(t) received from the terminal; and an authentication server, whereinthe terminal sets (n−1) values (V₁, V₂, . . . , V_(t−1), V_(t+1), . . ., V_(n)) by choosing an arbitrary random value, generates a firstdigital signature U on a message m by using the public parameters, thesecret key S_(t), a set (L={ID₁, . . . ID_(n)}) of identities of ringmembers including the identity ID_(t) of the user and the (n−1) values,generates a digital signature V_(t) of the user by using the firstdigital signature U, the message m, the set L and the secret key S_(t),generates a plurality of second digital signature including the (n−1)values used to generate the first digital signature U and the digitalsignature value V_(t) of the user, generates a ring signature τincluding the first digital signature U and the plurality of seconddigital signature, wherein the authentication server receives the set L,the message m and the ring signature τ on the message from the terminaland verifies validity of the ring signature τ by using the publicparameters, wherein the public parameters include an elliptic curvegroup G₁ and a multiplicative subgroup G₂ of finite field, each of theG₁ and G₂ denotes a group of prime order q, a bilinear pairing e, agenerator P of the G₁, a public key (P_(pub)=s·P) which is a scalarmultiplication of the generator P and a master secret key s of theprivate key generator, a result (g=e(P, P)) of the bilinear pairing etaking as an input the generator P, a first hash function H₁ and asecond hash function H₂.
 10. The system of claim 9, wherein the privatekey generator generates the secret key S_(t) according to${S_{t} = {\frac{1}{s + q_{t}}P}},$ wherein the q_(t) is an output(q_(t)=H₁(ID_(t))) of the first hash function H₁ taking as an input theidentity ID_(t) of the user, who requests the private key generator togenerate a secret key, as an input.
 11. The system of claim 9, whereinthe terminal of the user chooses (n−1) random points V_(i) (1≦i≦n, i≠t)from the G₁, computes a first hash value (q_(i)=H₁ (ID_(i))) of thefirst hash function H₁ on each identity ID_(i), wherein the identityID_(i) is an element of the set L, chooses a random number r, computes avalue g^(r) where the g is raised to a power r, a first bilinear pairingresult$e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{Pub}} \right)$with inputs an addition $\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}$ ofthe (n−1) random points V_(i) and the public key P_(pub), and a secondbilinear pairing result$e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)$with inputs an addition$\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}$ of a scalarmultiplication of the V_(i) by the q_(i) and the generator P, andgenerates the first digital signature U satisfying an equation of$U = {g^{r} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{{i = 1},{i \neq t}}^{n}{q_{i}V_{i}}},P} \right)}}$by using the value g^(r), the first bilinear pairing result and thesecond bilinear pairing result.
 12. The system of claim 11, wherein theterminal of the user generates the digital signature V_(t) of the useraccording to an equation of V_(t)=[r+H₂(m, U, L)]S_(t) which is a scalarmultiplication of (r+H₂(m, U, L) by the secret key S_(t), wherein the(r+H₂(m, U, L)) is an addition of the random number r and a second hashvalue (h=H₂(m, U, L)) over an integer set Z_(q), wherein the second hashvalue (h=H₂(m, U, L)) is an output of the second hash function H₂ whichtakes as inputs the message m, the first digital signature U and the setL.
 13. The system of claim 12, wherein the authentication server,receives the public parameters, the set L, the message m and the ringsignature r on the message m, computes the first hash value(q_(i)=H_(l)(ID_(i))) with input identity ID_(t) included in the set L,computes the second hash value (h=H₂(m, U, L)) with inputs the messagem, the first digital signature U and the set L, computes a firstbilinear pairing value$e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)$ with inputsa value $\sum\limits_{i = 1}^{n}V_{i}$ and the public key P_(pub),wherein the value $\sum\limits_{i = 1}^{n}V_{i}$ is an addition of theplurality of second digital signature, computes a second bilinearpairing value$e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)$ withinputs an value $\sum\limits_{i = 1}^{n}{q_{i}V_{i}}$ and thegenerator P, wherein the value $\sum\limits_{i = 1}^{n}{q_{i}V_{i}}$is an addition of a scalar multiplication of the V_(i) by the q_(i),computes a first output value${e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}$which is a multiplication of the first bilinear pairing value and thesecond bilinear pairing value, compute a second output value U·g^(h)which is a multiplication of the first digital signature U and a valueg^(h), where the g is raised to a power h, and verifies the validity ofthe ring signature τ according to a result of comparing the first outputvalue with the second output value, and outputs an accept signal whenthe first output value equals second output value and outputs a rejectsignal otherwise, wherein each of$\sum\limits_{i = 1}^{n}{V_{i}\mspace{14mu} {and}\mspace{14mu} {\sum\limits_{i = 1}^{n}{q_{i}V_{i}}}}$is an addition operation in the G₁, the${e\left( {{\sum\limits_{i = 1}^{n}V_{i}},P_{Pub}} \right)} \cdot {e\left( {{\sum\limits_{i = 1}^{n}{q_{i}V_{i}}},P} \right)}$is a multiplication operation in the G₂, and the U·g^(h) is amultiplication operation over the G₂.