Skip to main content
Log in

An efficient lattice-based linkable ring signature scheme with scalability to multiple layer

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In this paper, we propose a novel lattice-based linkable ring signature scheme based on the Borromean ring signature. In our scheme, to avoid the extra overhead caused by reject sampling that used in the existing schemes, we use an exact indistinguishable distribution to replace it. Using our method, signature will be successfully generated without repeating, so the size of the signature can be reduced. Furthermore, our scheme can be extended to multiple layers easily. We also propose a lattice-based multilayer linkable ring signature scheme which can be use for transactions with multiple inputs. Then, we prove that our scheme has unforgeability, anonymity, linkability and non-slanderability that a linkable ring signature scheme should have. Efficiency analysis shows that our scheme has a smaller signature size under the same security conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Data availability

No data were used to support this study.

References

  • Albrecht MR, Deo A (2017) Large modulus ring-LWE \(\ge \) Module-LWE. In: International conference on the theory and application of cryptology and information security (Springer), pp. 267–296

  • Au MH, Chow SS, Susilo W, Tsang PP (2006) Short linkable ring signatures revisited. In: European public key infrastructure workshop (Springer), pp. 101–115

  • Au MH, Liu JK, Susilo W, Yuen TH (2007) Certificate based (linkable) ring signature. In: International conference on information security practice and experience (Springer), pp. 79–92

  • Au MH, Liu JK, Susilo W, Yuen TH (2013) Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor Comput Sci 469:1

    Article  MathSciNet  Google Scholar 

  • Baum C, Lin H, Oechsner S (2018) Towards practical lattice-based one-time linkable ring signatures. In: International conference on information and communications security (Springer), pp. 303–322

  • Bender A, Katz J, Morselli R (2006) Ring signatures: stronger definitions, and constructions without random oracles. In: Theory of cryptography conference (Springer), pp. 60–79

  • Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, Schwabe P, Seiler G, Stehlé D (2018) CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European symposium on security and privacy (EuroS&P) (IEEE), pp. 353–367

  • Brakerski Z, Kalai YT (2010) A framework for efficient signatures, ring signatures and identity based encryption in the standard model. IACR Cryptol Arch 1:86

    Google Scholar 

  • Dodis Y, Kiayias A, Nicolosi A, Shoup V (2004) Anonymous identification in ad hoc groups. In: International conference on the theory and applications of cryptographic techniques (Springer), pp. 609–626

  • Ducas L, Durmus A, Lepoint T, Lyubashevsky V (2013) Lattice signatures and bimodal Gaussians. In: Annual cryptology conference (Springer), pp. 40–56

  • Esgin MF, Steinfeld R, Sakzad A, Liu JK, Liu D (2019) Short lattice-based one-out-of-many proofs and applications to ring signatures. In: International conference on applied cryptography and network security (Springer), pp. 67–88

  • Franklin MK, Zhang H (2012) A framework for unique ring signatures. IACR Cryptology ePrint Archive, p 577

  • Fujisaki E, Suzuki K (2007) Traceable ring signature. In: International workshop on public key cryptography (Springer), pp. 181–200

  • García-Gil D, Luque-Sánchez F, Luengo J, García S, Herrera F (2019) From big to smart data: iterative ensemble filter for noise filtering in Big Data classification. Int J Intell Syst 34(12):3260. https://doi.org/10.1002/int.22193

    Article  Google Scholar 

  • Jiang N, Xu D, Zhou J, Yan H, Wan T, Zheng J (2020) Toward optimal participant decisions with voting-based incentive model for crowd sensing. Inf Sci 512:1

    Article  Google Scholar 

  • Langlois A, Stehlé D (2015) Worst-case to average-case reductions for module lattices. Des Codes Cryptogr 75(3):565

    Article  MathSciNet  Google Scholar 

  • Li X, Niu JW, Ma J, Wang WD, Liu CL (2011) Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 34(1):73

    Article  Google Scholar 

  • Li X, Niu J, Khurram Khan M, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365. Doi: 10.1016/j.jnca.2013.02.034. http://www.sciencedirect.com/science/article/pii/S1084804513000726

  • Li J, Wang X, Huang Z, Wang L, Xiang Y (2019) Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J Parallel Distrib Comput 130:91

    Article  Google Scholar 

  • Li T, Chen Y, Wang Y, Wang Y, Zhao M, Zhu H, Tian Y, Yu X, Yang Y (2020) Rational protocols and attacks in blockchain system. Secur Commun Netw. https://doi.org/10.1155/2020/8839047

    Article  Google Scholar 

  • Libert B, Ling S, Nguyen K, Wang H (2016) Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Annual international conference on the theory and applications of cryptographic techniques (Springer), pp. 1–31

  • Libert B, Ling S, Nguyen K, Wang H (2017) Zero-knowledge arguments for lattice-based prfs and applications to e-cash. In: International conference on the theory and application of cryptology and information security (Springer), pp. 304–335

  • Liu JK, Wong DS (2005) Linkable ring signatures: Security models and new schemes. In: International conference on computational science and its applications (Springer), pp. 614–623

  • Liu JK, Wong DS (2006) Enhanced security models and a generic construction approach for linkable ring signature. Int J Found Comput Sci 17(06):1403

    Article  MathSciNet  Google Scholar 

  • Liu JK, Wei VK, Wong DS (2004) Linkable spontaneous anonymous group signature for ad hoc groups. In: Australasian conference on information security and privacy (Springer), pp. 325–335

  • Liu JK, Au MH, Susilo W, Zhou J (2013) Linkable ring signature with unconditional anonymity. IEEE Trans Knowl Data Eng 26(1):157

    Article  Google Scholar 

  • Liu Z, Wang L, Wang X, Shen X, Li L (2019a) Secure remote sensing image registration based on compressed sensing in cloud setting. IEEE Access 7:36516

    Article  Google Scholar 

  • Liu Z, Nguyen K, Yang G, Wang H, Wong DS (2019b) A lattice-based linkable ring signature supporting stealth addresses. In: European symposium on research in computer security (Springer), pp. 726–746

  • Lu X, Au MH, Zhang Z (2019) Raptor: a practical lattice-based (linkable) ring signature. In: International conference on applied cryptography and network security (Springer), pp. 110–130

  • Lyubashevsky V (2009) Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. In: International conference on the theory and application of cryptology and information security (Springer), pp. 598–616

  • Melchor CA, Bettaieb S, Boyen X, Fousse L, Gaborit P (2013) Adapting Lyubashevskys signature schemes to the ring signature setting. In: International conference on cryptology in Africa (Springer), pp. 1–25

  • Noether S (2015) Ring signature confidential transactions for monero., IACR Cryptology ePrint Archive, 1098

  • Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: International conference on the theory and application of cryptology and information security (Springer), pp. 552–565

  • Sun SF, Au MH, Liu JK, Yuen TH (2017) RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: European symposium on research in computer security (Springer), pp. 456–474

  • Torres WAA, Steinfeld R, Sakzad A, Liu JK, Kuchta V, Bhattacharjee N, Au MH, Cheng J (2018) Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1. 0). In: Australasian conference on information security and privacy (Springer), pp. 558–576

  • Tsang PP, Wei VK (2005) Short linkable ring signatures for e-voting, e-cash and attestation. In: International conference on information security practice and experience (Springer), pp. 48–60

  • Tsang PP, Au MH, Liu JK, Susilo W, Wong DS (2010) A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity. In: International conference on provable security (Springer), pp. 166–183

  • Wang X, Zhang Y, Gupta BB, Zhu H, Liu D (2019) An identity-based signcryption on lattice without trapdoor. J UCS 25(3):282

    MathSciNet  Google Scholar 

  • Wang Y, Yang G, Bracciali A, Leung HF, Yu X (2020a) Incentive compatible and anti-compounding of wealth in proof-of-stake. Inf Sci 530:85

    Article  MathSciNet  Google Scholar 

  • Wang Y, Yang G, Li T, Li F, Tian Y, Yu X (2020b) Belief and fairness: a secure two-party protocol toward the view of entropy for IoT devices. J Netw Comput Appl 161:102641

    Article  Google Scholar 

  • Yuen TH, Liu JK, Au MH, Susilo W, Zhou J (2013) Efficient linkable and/or threshold ring signature without random oracles. Comput J 56(4):407

    Article  Google Scholar 

  • Zhao Q, Zhao C, Cui S, Jing S, Chen Z (2020) PrivateDL: privacy-preserving collaborative deep learning against leakage from gradient sharing. Int J Intell Syst 35(8):1262–79

    Article  Google Scholar 

  • Zheng D, Li X, Chen K, Li J (2007) Linkable ring signatures from linear feedback shift register. In: International conference on embedded and ubiquitous computing (Springer), pp. 716–727

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of Shanxi (Grant No.201601D021014), Higher Education Technology Innovation Projects Foundation of Shanxi (Grant No.2019L0860), National Natural Science Foundation of China (Grant No. 61702124) and the Subject Research Projects Foundation of Key Laboratory of Information Security Technology of Guangdong (Grant No. GDXXAQ2016-05).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Ren.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ren, Y., Guan, H. & Zhao, Q. An efficient lattice-based linkable ring signature scheme with scalability to multiple layer. J Ambient Intell Human Comput 13, 1547–1556 (2022). https://doi.org/10.1007/s12652-021-03092-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03092-1

Keywords

Navigation