skip to main content
10.1145/3586102.3586110acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Identity-based Linkable Blind Ring Signature Scheme on Lattice

Published: 24 July 2023 Publication History

Abstract

Identity-based link-ring signature schemes are widely used in e-commerce, e-voting, blockchain security and other fields.The link-ability of signature scheme ensures that the same user can only sign once with the same private key. Aiming at the requirements of question confidentiality, anonymity of the signature user identity, and one-time signature in the process of question signing in online exams, this paper proposes an identity-based linkable blind ring signature scheme. In this paper, the lattice delegation algorithm is used to generate the user's private key, a one-time random matrix is introduced, and the one-time signature key is generated by running the preimage sampling algorithm (SamplePre) based on the signed user's private key. Finally, this paper proves the unconditional anonymity, unforgeability and link-ability of the scheme under the random oracle model based on the small integer solution(SIS) difficulty assumption.

References

[1]
CHAUM D.1983. Blind Signatures for Untraceablc Payments//Springer. Advances in Cryptology, August 19-22, 1983, Boston, MA, USA. Heidelberg: Springer, 1983: 199-203.
[2]
ABE M, FUJ1SAK1 E. How to Date Blind Signatures//Springer. International Conference on the Theory and Application of Cryptology and Information Security, November 3-7, 1996, Berlin, Heidelberg, Germany. Heidelberg: Springer, 1996: 244-251.
[3]
LIN W D, JAN J K.2020. Security Personal Learning Tools Using A Proxy Blind Signature Scheme. https://www.research gate.net/publication/239065774 Security personal learning tools using a proxy blind signature scheme, 2020.5.20.
[4]
Yinjuan Deng. 2017. Lattice-based hierarchical blind signature. HENAN SCIENCE, 35(3) (2017), 5.
[5]
Qing Y E, Jing Zhou, Yongli Tang, Junfeng Wang. (2018). Identity-based against quantum attacks partially blind signature scheme from lattice. Netinfo Security, 18(3), 46-53.
[6]
Yihua Zhou, Songshou Dong, Yuguang Yang.(2021). A Lattice-based Identity-based Proxy Partially Blind Signature Scheme in the Standard Model. Netinfo Security, 2021, 21(3): 37-43.
[7]
Xiaoping Zhang. Lattice-based certificateless blind signature scheme. Journal of Henan Institute of Science and Technology(Natural Science Edition), 2021, 49(4): 51-57.
[8]
LIU J K, WEI V K, WONG D S. Linkable spontaneous anonymous group signature for ad hoc groups. In: Information Security and Privacy一ACISP 2004. Springer Berlin Heidelberg, 2004: 325-335. [ 3-540-27800-9-28]
[9]
ZHUANG L S, CHEN J, WANG Q Y. Lattice-based linkable threshold ring signature in e-voting. Journal of Cryptologic Research, 2021, 8(3): 402–416. [
[10]
Jiechang Wang, Ping Zhang, Jie LI, Linlin Chang, Yin Dang. short linkable ring signature on lattice.Application Research of Computers:1-7[2022-07-06].
[11]
LIU Mengqin, Wang Xueming. Identity-Based Linkable Ring Signature Schemes on Lattice.Application Research of Computers:1-6[2022-07-06].
[12]
Abe M., Ohkubo M., Suzuki K. 1-out-of-n Signatures from a Variety of Keys. International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2002: 415-432
[13]
Ducas L., Durmus A., Lepoint T., Lattice Signatures and Bimodal Gaussians . Annual Cryptology Conference. Berlin: Springer, 2013: 40-56
[14]
Torres W. A. A., Steinffeld R., Sakzad A., Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT vl.0). Australasian Conference on Infomiation Security and Privacy. Cham: Springer, 2018: 558-576
[15]
Yongli Tang, Feifei Xia, Qing Ye, Yongjun Wang, Xiaohang Zhang. Identity-based linkable ring signature on lattice. Journal of Cryptologic Research, 2021, 8(2): 232–247. [
[16]
Lili Zhang, Yanqin Ma. A lattice-based Identity-based Proxy Blind Signature Scheme in the Standard Model. https://downloads.hindawi.eom/journals/mpe/2014/307637.pdf. 2020-05-12.
[17]
AJTAI M. Generating Hard Instances of the Short Basis Problem// Springer. International Colloquium on Automata, Languages and Programming, July 11-15, 1999, Berlin, Heidelberg, German. Heidelberg: Springer, 1999: 1-9.
[18]
M1CC1ANCIO D, REGEV O. Worst-case to Average-case Reductions Based on Gaussian Measures. SIAM Journal on Computing, 2007, 37(1): 267-302.
[19]
LYUBASHEVSKY V, MICCIANCIO D. Asymptotically Efficient Lattice-based Digital Signatures. Journal of Cryptology, 2008, 31(6): 774-797.
[20]
GAO Wen, HU Yupu, WANG Baocang, Identity-based Blind Signature from Lattices in Standard Model//Springer. International Conference on Information Security and Cryptology, November 4-6, 2016, Cham, Switzerland. Heidelberg: Springer, 2016: 205-218.
[21]
AU M H, LIU J K, SUSILO W, Secure ID-based linkable and revocable-linked ring signature with constant-size construction . Theoretical Computer Science, 2013: 469: 1-14. [
[22]
BAUM C, LIN H, OECHSNER S. Towards practical lattice-based one-time linkable ring signature. IACR Cryptology ePrint Archive, 2018: 2018/857. http://eprint.iacr.org/2018/857.pdf

Index Terms

  1. Identity-based Linkable Blind Ring Signature Scheme on Lattice

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network Security
    December 2022
    241 pages
    ISBN:9781450397520
    DOI:10.1145/3586102
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 July 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Based on Identity
    2. Lattice
    3. Linkable Ring Signature
    4. Reject Sampling Technology

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCNS 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 77
      Total Downloads
    • Downloads (Last 12 months)40
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media