Skip to main content

Application of Lattice-Based Unique Ring Signature in Blockchain Transactions

  • Conference paper
  • First Online:
Artificial Intelligence Security and Privacy (AIS&P 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14510))

  • 101 Accesses

Abstract

Ring signature schemes provide anonymity but suffer from the double-spending problem if uncontrolled overused in blockchain transactions. In the unique ring signature scheme, each member in the ring can only generate one signature for one message at most on behalf of the ring, which can effectively prevent the problem of double spending. However, most of the existing unique ring signature schemes are constructed based on the difficult problems of traditional cryptography, which are not safe in the post-quantum environment. This paper design and propose a lattice based unique ring signature scheme, which can provide anonymity protection for the transaction initiator when users trade, and can prevent malicious users from double flower attacks, ensuring the legitimacy of the transaction, and this scheme is safe in the quantum environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_32

    Chapter  Google Scholar 

  2. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  3. Franklin, M., Zhang, H.: A framework for unique ring signatures.IACR Cryptol. ePrint Arch. 2012, 577 (2012)

    Google Scholar 

  4. Franklin, M., Zhang, H.: Unique ring signatures: a practical construction. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 162–170. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_13

    Chapter  Google Scholar 

  5. Mercer, R.: Privacy on the blockchain: Unique ring signatures. arXiv preprint arXiv:1612.01188 (2016)

  6. Ta, A.T., et al: Efficient unique ring signature for blockchain privacy protection. In: Baek, J., Ruj, S. (eds.) ACISP 2021. LNCS, vol. 13083, pp. 391–407. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90567-5_20

    Chapter  Google Scholar 

  7. Regev, O.: Lattice-based cryptography. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 131–141. Springer, Heidelberg (2006). https://doi.org/10.1007/11818175_8

    Chapter  Google Scholar 

  8. Gentry, C., Peikert, C, Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206 (2008)

    Google Scholar 

  9. Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_32

    Chapter  Google Scholar 

  10. Banerjee, A., Peikert, C., Rosen, A.: Pseudorandom functions and lattices. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 719–737. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_42

    Chapter  Google Scholar 

  11. Duan, J., Gu, L., Zheng, S.: Polymerized RingCT: an efficient linkable ring signature for ring confidential transactions in blockchain. J. Phys: Conf. Ser. 1738(1), 012109 (2021)

    Google Scholar 

  12. Shen, C.: Research on blockchain privacy threats and protection technologies. Netw. Secur. Data Gov. 42(04), 1–8 (2023)

    Google Scholar 

  13. Xie, Q., Yang, N., Feng, X.: Overview of privacy protection technologies for blockchain transactions. Comput. Appl. 1–14 (2023)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengyin Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, F., Wang, J., Zhang, D., Li, G., Yu, X. (2024). Application of Lattice-Based Unique Ring Signature in Blockchain Transactions. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14510. Springer, Singapore. https://doi.org/10.1007/978-981-99-9788-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9788-6_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9787-9

  • Online ISBN: 978-981-99-9788-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics