Identity-Based Linkable Ring Signature Scheme

A ring signature is an anonymous signature that implements both the authentication of the message and the anonymity of the signer. In a “normal” ring signature scheme, the same signer can generate multiple ring signatures, but the verifier cannot find this fact. Linkable ring signature (LRS) solves the problem. In the setting, the identity of the signer is still anonymous, and if the same signer generates multiple ring signatures, the verifier can confirm the fact. Linkable ring signatures are applied to some actual scenarios, such as e-cash, e-voting and ad-hoc network authentication. In this paper, we presented a new identity-based linkable ring signature scheme that avoids certificate management. We then gave the security proofs in the random oracle model (ROM) and compared the efficiency of it with the previous schemes. The new scheme requires only 7 pairing operations in signing and verifying. It is the most efficient linkable ring signature in the identity-based setting.

[1]  Yunlei Zhao,et al.  Practical Constant-Size Ring Signature , 2018, Journal of Computer Science and Technology.

[2]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[3]  Tsz Hon Yuen,et al.  Escrowed Linkability of Ring Signatures and Its Applications , 2006, VIETCRYPT.

[4]  Joseph K. Liu,et al.  Separable Linkable Threshold Ring Signatures , 2004, INDOCRYPT.

[5]  Lunzhi Deng,et al.  Two new identity-based threshold ring signature schemes , 2014, Theor. Comput. Sci..

[6]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[7]  Xavier Boyen,et al.  Forward-Secure Linkable Ring Signatures , 2018, ACISP.

[8]  Joseph K. Liu,et al.  Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.

[9]  Eiichiro Fujisaki Sub-linear Size Traceable Ring Signatures without Random Oracles , 2011, CT-RSA.

[10]  Victor K.-W. Wei,et al.  Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation , 2005, ISPEC.

[11]  Sherali Zeadally,et al.  Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures , 2016, IEEE Transactions on Information Forensics and Security.

[12]  Yi Mu,et al.  Identity-based quotable ring signature , 2015, Inf. Sci..

[13]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[14]  Jianhua Li,et al.  Linkable Ring Signatures from Linear Feedback Shift Register , 2007, EUC Workshops.

[15]  Xiaolei Dong,et al.  Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols , 2018, Comput. J..

[16]  Tsz Hon Yuen,et al.  Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction , 2013, Theor. Comput. Sci..

[17]  Javier Herranz Identity-based ring signatures from RSA , 2007, Theor. Comput. Sci..

[18]  Tsz Hon Yuen,et al.  Efficient Linkable and/or Threshold Ring Signature Without Random Oracles , 2013, Comput. J..

[19]  Sabine Oechsner,et al.  Towards Practical Lattice-Based One-Time Linkable Ring Signatures , 2018, IACR Cryptol. ePrint Arch..

[20]  Joseph K. Liu,et al.  Linkable Ring Signature with Unconditional Anonymity , 2014, IEEE Transactions on Knowledge and Data Engineering.

[21]  Dong Hoon Lee,et al.  Analysis of Revocable-iff-Linked Ring Signature Scheme , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[22]  Tsz Hon Yuen,et al.  Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature , 2006, INDOCRYPT.

[23]  Dong Hoon Lee,et al.  Ring Signature with Weak Linkability and Its Applications , 2008, IEEE Transactions on Knowledge and Data Engineering.

[24]  Qiong Huang,et al.  Leakage-resilient ring signature schemes , 2019, Theor. Comput. Sci..

[25]  Joseph K. Liu,et al.  Linkable Ring Signatures: Security Models and New Schemes , 2005, ICCSA.

[26]  Joseph K. Liu,et al.  A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) , 2010, ProvSec.

[27]  Siu-Ming Yiu,et al.  Efficient Identity Based Ring Signature , 2005, ACNS.