Deniable ring signature scheme based on the ISRSAC digital signature algorithm

被引:0
|
作者
Zhang, Yanshuo [1 ]
Yuan, Yuqi [1 ]
Liu, Ning [1 ]
Chen, Ying [1 ]
Dong, Youheng [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Cryptol Sci & Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
ISRSAC; Computer architecture; Ring signature; Privacy protection; Controllable supervision;
D O I
10.7717/peerj-cs.2190
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This article introduces a deniable ring signature scheme within the framework of a ring signature protocol, which allows a member of the ring to assert or deny their role as the signature's originator without the involvement of a trusted third party. Deniable ring signatures find applications in various scenarios where balancing privacy protection with supervised oversight is crucial. In this work, we present a novel deniable ring signature scheme based on the ISRSAC digital signature, tailored for environments with regulatory requirements, empowering regulators to hold malicious signers accountable. We formally validate the scheme's correctness, unforgeability, anonymity, traceability, and non-frameability through rigorous proofs. Additionally, we conduct a comparative analysis of the communication and computational overheads associated with our proposed scheme, demonstrating its superiority in practical scenarios such as electronic auctions and anonymous reporting mechanisms.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] A multivariate based threshold ring signature scheme
    Albrecht Petzoldt
    Stanislav Bulygin
    Johannes Buchmann
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2013, 24 : 255 - 275
  • [22] LFSR-based ring signature scheme
    Zheng Dong
    Li Xiangxue
    Chen Kefei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (03) : 397 - 400
  • [23] Threshold Ring Signature Scheme Based on TPM
    Bei, Gong
    Wei, Jiang
    Li, Lin
    Yu, Li
    Xing, Zhang
    [J]. CHINA COMMUNICATIONS, 2012, 9 (01) : 80 - 85
  • [24] ID-based deniable ring authentication with constant-size signature
    Wang L.
    Zhang G.
    Ma C.
    [J]. Frontiers of Computer Science in China, 2008, 2 (01): : 106 - 112
  • [25] Digital Signature Based on PlayGamal Algorithm
    Ghofar, Abdul
    Hardi, Muhamad
    Firdaus, Muhammad Nuur
    Shidik, Guruh Fajar
    [J]. 2017 INTERNATIONAL SEMINAR ON APPLICATION FOR TECHNOLOGY OF INFORMATION AND COMMUNICATION (ISEMANTIC), 2017, : 58 - 65
  • [26] Revocable Attribute-Based Ring Signature Scheme with Constant Size Signature
    Yang, Tonghao
    Yu, Bin
    Wang, Hengjun
    Li, Junquan
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 100 - 104
  • [27] Identity-based ring signature scheme with constant-size signature
    Wang, Ling-Ling
    Zhang, Guo-Yin
    Ma, Chun-Guang
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (11): : 2645 - 2648
  • [28] Attribute-based ring signature scheme with constant-size signature
    Wenqiang, W.
    Shaozhen, C.
    [J]. IET INFORMATION SECURITY, 2010, 4 (02) : 104 - 110
  • [29] Digital Signature Schemes Based on Group Ring
    Kumar S.
    Mittal G.
    Kumar S.
    [J]. SN Computer Science, 3 (5)
  • [30] A new ring signature scheme
    Toluee, Rahim
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    [J]. 2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,