A Traceable Ring Signature Scheme Based on Coding Theory

被引:12
|
作者
Branco, Pedro [1 ]
Mateus, Paulo [1 ]
机构
[1] IST Univ Lisboa, SQIG Inst Telecomunicacoes, Dept Math, Lisbon, Portugal
来源
关键词
Traceable ring signature scheme; Code-based cryptography; Stern's protocol; IDENTIFICATION; SECURITY;
D O I
10.1007/978-3-030-25510-7_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traceable ring signatures are a variant of ring signatures which allows the identity of a user to be revealed, when it signs two different messages with respect to the same group of users. It has applications in e-voting and in cryptocurrencies, such as the well-known Monero. We propose the first traceable ring signature scheme whose security is based on the hardness of the Syndrome Decoding problem, a problem in coding theory which is conjectured to be unsolvable by both classical and quantum algorithms. To construct the scheme, we use a variant of Stern's protocol and, by applying the Fiat-Shamir transform to it in an ingenious way, we obtain a ring signature that allows traceability. We prove that the resulting protocol has the standard security properties for traceable ring signatures in the random oracle model: tag-linkability, anonymity and exculpability. As far as we know, this is the first proposal for a traceable ring signature scheme in the post-quantum setting.
引用
收藏
页码:387 / 403
页数:17
相关论文
共 50 条
  • [21] An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection
    Teng, Da
    Yao, Yanqing
    Wang, Yingdong
    Zhou, Lei
    Huang, Chao
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 296 - 313
  • [22] Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
    Yongxin Zhang
    Hong Lei
    Bin Wang
    Qinghao Wang
    Ning Lu
    Wenbo Shi
    Bangdao Chen
    Qiuling Yue
    [J]. Frontiers of Computer Science, 2024, 18
  • [23] Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
    Zhang, Yongxin
    Lei, Hong
    Wang, Bin
    Wang, Qinghao
    Lu, Ning
    Shi, Wenbo
    Chen, Bangdao
    Yue, Qiuling
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)
  • [24] A ring signature scheme based on the Nyberg-Rueppel signature scheme
    Gao, CZ
    Yao, ZA
    Li, L
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 169 - 175
  • [25] Provably secure strong designated verifier signature scheme based on coding theory
    Shooshtari, Masoumeh Koochak
    Ahmadian-Attari, Mahmoud
    Aref, Mohammad Reza
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
  • [26] A Concurrent Signature Scheme from Coding Theory Assumptions
    Assidi, Hafsa
    [J]. ENGINEERING LETTERS, 2023, 31 (02) : 603 - 610
  • [27] Forward-secure traceable ring signature
    Hu, Chengyu
    Li, Daxing
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 200 - +
  • [28] Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice
    Han, Longbo
    Cao, Suzhen
    Yang, Xiaodong
    Zhang, Zhiqiang
    [J]. IEEE ACCESS, 2020, 8 : 206581 - 206591
  • [29] A Threshold RSA Signature Scheme with Traceable Signers
    Shi, Runhua
    Zhong, Hong
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 647 - 649
  • [30] A certificateless ring signature scheme based on lattice
    Dong, SongShou
    Zhou, YiHua
    Yang, YuGuang
    Yao, Yanqing
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (28):