Lattice-based deniable ring signatures

W Gao, L Chen, Y Hu, CJP Newton, B Wang… - International Journal of …, 2019 - Springer
W Gao, L Chen, Y Hu, CJP Newton, B Wang, J Chen
International Journal of Information Security, 2019Springer
In cryptography, a ring signature is anonymous as it hides the signer's identity among other
users. When generating the signature, the users are arranged as a ring. Compared with
group signatures, a ring signature scheme needs no group manager or special setup and
supports flexibility of group choice. However, the anonymity provided by ring signatures can
be used to conceal a malicious signer and put other ring members under suspicion. At the
other extreme, it does not allow the actual signer to prove their identity and gain recognition …
Abstract
In cryptography, a ring signature is anonymous as it hides the signer’s identity among other users. When generating the signature, the users are arranged as a ring. Compared with group signatures, a ring signature scheme needs no group manager or special setup and supports flexibility of group choice. However, the anonymity provided by ring signatures can be used to conceal a malicious signer and put other ring members under suspicion. At the other extreme, it does not allow the actual signer to prove their identity and gain recognition for their actions. A deniable ring signature is designed to overcome these disadvantages. It can initially protect the signer, but if necessary, it enables other ring members to deny their involvement, and allows the real signer to prove who made the signed action. Many real-world applications can benefit from such signatures. Inspired by the requirement for them to remain viable in the post-quantum age, this work proposes a new non-interactive deniable ring signature scheme based on lattice assumptions. Our scheme is proved to be anonymous, traceable and non-frameable under quantum attacks.
Springer
Showing the best result for this search. See all results