Abstract
Ring signature schemes provide anonymity but suffer from the double-spending problem if uncontrolled overused in blockchain transactions. In the unique ring signature scheme, each member in the ring can only generate one signature for one message at most on behalf of the ring, which can effectively prevent the problem of double spending. However, most of the existing unique ring signature schemes are constructed based on the difficult problems of traditional cryptography, which are not safe in the post-quantum environment. This paper design and propose a lattice based unique ring signature scheme, which can provide anonymity protection for the transaction initiator when users trade, and can prevent malicious users from double flower attacks, ensuring the legitimacy of the transaction, and this scheme is safe in the quantum environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_32
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Franklin, M., Zhang, H.: A framework for unique ring signatures.IACR Cryptol. ePrint Arch. 2012, 577 (2012)
Franklin, M., Zhang, H.: Unique ring signatures: a practical construction. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 162–170. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_13
Mercer, R.: Privacy on the blockchain: Unique ring signatures. arXiv preprint arXiv:1612.01188 (2016)
Ta, A.T., et al: Efficient unique ring signature for blockchain privacy protection. In: Baek, J., Ruj, S. (eds.) ACISP 2021. LNCS, vol. 13083, pp. 391–407. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90567-5_20
Regev, O.: Lattice-based cryptography. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 131–141. Springer, Heidelberg (2006). https://doi.org/10.1007/11818175_8
Gentry, C., Peikert, C, Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206 (2008)
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_32
Banerjee, A., Peikert, C., Rosen, A.: Pseudorandom functions and lattices. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 719–737. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_42
Duan, J., Gu, L., Zheng, S.: Polymerized RingCT: an efficient linkable ring signature for ring confidential transactions in blockchain. J. Phys: Conf. Ser. 1738(1), 012109 (2021)
Shen, C.: Research on blockchain privacy threats and protection technologies. Netw. Secur. Data Gov. 42(04), 1–8 (2023)
Xie, Q., Yang, N., Feng, X.: Overview of privacy protection technologies for blockchain transactions. Comput. Appl. 1–14 (2023)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, F., Wang, J., Zhang, D., Li, G., Yu, X. (2024). Application of Lattice-Based Unique Ring Signature in Blockchain Transactions. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14510. Springer, Singapore. https://doi.org/10.1007/978-981-99-9788-6_1
Download citation
DOI: https://doi.org/10.1007/978-981-99-9788-6_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9787-9
Online ISBN: 978-981-99-9788-6
eBook Packages: Computer ScienceComputer Science (R0)