Skip to main content
Entropy logoLink to Entropy
. 2023 Jan 28;25(2):237. doi: 10.3390/e25020237

A Novel Linkable Ring Signature on Ideal Lattices

Chengtang Cao 1,2, Lin You 1,*, Gengran Hu 1
Editors: Bill William Buchanan, Arslan Munir, Jawad Ahmad
PMCID: PMC9955708  PMID: 36832604

Abstract

In this paper, a novel linkable ring signature scheme is constructed. The hash value of the public key in the ring and the signer’s private key are based on random numbers. This setting makes it unnecessary to set the linkable label separately for our constructed scheme. When judging the linkability, it is necessary to determine whether the number of the intersections of the two sets reaches the threshold related to the number of the ring members. In addition, under the random oracle model, the unforgeability is reduced to the SVPγ problem. The anonymity is proved based on the definition of statistical distance and its properties.

Keywords: ring signature, linkability, lattice

1. Introduction

In 2001, Rivest et al. [1] proposed the concept of ring signature. In a ring signature, the signer chooses several other users’ public keys to form a set with his own public key. In the signature verification phase, the verifier can confirm that the signature is generated by one of the ring members, but the verifier cannot find the real signer. There are many signature schemes that extend the original ring signature scheme to special scenarios, such as the deniable ring signature scheme in [2,3], the identity-based ring signature scheme in [4,5,6,7,8,9], and the linkable ring signature scheme in [10,11,12,13]. Linkable ring signature was a special ring signature proposed by Liu et al. [11]. Linkable ring signature is suitable for many practical scenarios, such as e-cash and e-voting. The general ring signature is not suitable for electronic voting because it is difficult to determine whether the same voter has voted more than once. Linkable ring signature can solve this problem, and the verifier can detect whether the generated votes are from the same voter through the linkable label. In 2021, Tang et al. [14] constructed an identity-based linkable ring signature scheme on NTRU lattice. In 2022, Ye et al. [15] constructed a linkable ring signature scheme on NTRU lattice. In [10,11,12,13,14,15], the linkability of the each signature scheme were determined by generating tags.

The signature schemes were based on the discrete logarithm in [1,11,13,16] and the bilinear pair in [17,18,19]. There are also parts of the literature that are based on lattices [3,14,20,21,22,23,24,25,26]. Lyubshvsky gave a signature scheme and a new hash function for calculating the difficulty problem based on ideal lattices in [27]. In [23], the first ring signature scheme was constructed by using the scheme [27]. In [3], a ring signature scheme with deniable property was constructed based on [3,27].

Based on [11,23,24], the output of the hash function of the public key in the ring and the signer’s private key are used to selecte random numbers. We give a new general structure of linkability, and construct a linkable ring signature scheme on ideal lattices (LRS).

Contributions

• Replace the random number in the signature algorithm in [23] with the hash value of the public key in the ring and the private key. Our signature scheme (LRS) and the scheme in [23] have the same length of the public key, the secret key and the signature output, but our LRS is linkable.

• In [10,11,12,13,14,15,25,26], the linkable criterion was that the linkability label was the same. Unlike this, in our scheme, the linkability criterion is to determine the maximum number of the elements in the intersection of the two sets rather than the number of the ring members.

2. Preliminaries

2.1. Notations

The notations is in Table 1.

Table 1.

Notations.

Symbol Description
|S| If S={s1,s2,,sn}, then |S|=n.
[i] {1,2,,i}.
x$S x is a uniformly random sample from the set S.
Zp Z/pZ.
D {aZp[x]/xn+1:a=i=0n1aixi,ai{p12,,p12}}.
L the ideal lattice.
a a=maxi(ai), where a=i=0naixiZ[x].
a^ a^=(a1,a2,,am)(Z[x])m.
a^ a^=maxiai, where aiZ[x].

2.2. Hash Functions

Definition 1

([28]). For mZ+ and DhD, let H(D,Dh,m)={ha^:a^Dm} be the function family such that for any z^=(z1,z2,,zm)Dhm, ha^(z^)=a^·z^=Σi[m]aiziD, where a^=(a1,a2,,am).

According to [28], for y^,y^Dhm, cD and hH(D,Dh,m), then

h(y^+y^)=h(y^)+h(y^),
h(cy^)=c·h(y^).

Definition 2

([28] Collision Problem). For mZ+, DhD and hH(D,Dh,m), the Collision Problem Col(h,Dh) asks to find y^,y^Dhm and y^y^ such that h(y^)=h(y^).

Definition 3

([28]). For γ>1, monic polynomial f and a lattice L corresponding to an ideal in the ring Z[x]/f, the fsvpγ problem asks to find gL such that gγλ1(L), where λ1 is the length of the shortest nonzero vector on L.

In Theorem 3.1 of the literature [27], if f=xn+1 (where n=2k,kZ+), we can get the following theorem.

Theorem 1

([27]). Let D=Zp[x]/xn+1 be a ring (where n=2k,kZ+). Define the set Dh={yD:yd,dZ+}. Let H(D,Dh,m) be a function family as in Definition 1 such that m>logplog2d and p4dmn1.5logn. If there is a polynomial-time algorithm that can solve Col(ha^,Dh) for random ha^H(D,Dh,m) with some non-negligible probability, then there is a polynomial-time algorithm that can solve (xn+1)SVPγ(L) for every lattice corresponding to an ideal in D, where γ=16dmnlog2n.

2.3. Statistical Distance

Definition 4

([29]). Let X and X be two random variables over a countable set S. The statistical distance between X and X is defined by

Δ(X,X)=12xS|Pr[X=x]Pr[X=x]|.

3. Framework and Security Model of LRS Scheme

Our LRS consists five probabilistic polynomial time (PPT) algorithms.

  • SetUp: Input the security parameter n, and output the public parameter P.

  • KeyGen: Input P, and output of a keypair (pk,sk).

  • Sign: Input P, a singer’s (pk,sk), a message μ and the ring PK (pkPK), and output a signature σ.

  • Verify: Input the signature σ, and output “1” or “0”.

  • Link: Input two valid signatures (σ1,σ2), and output “1” or “0”.

The LRS is correct that the verification algorithm outputs “1” for the valid signature and “0” for the invalid signature.

Security Properties

The LRS satisfies the unforgeabilityy, anonymit and linkability which is similar to [11,13,23].

Definition 5

(Unforgeability). The LRS is unforgeable if there is no PPT A to win the following games with an advantage that cannot be ignored.

Setup: C calls LRS-SetUp to generate the parameters P and calls LRS-KeyGen to generate the keypair (pki,ski), and sends the parameters P and all public keys pki to A.

Query: the adversary A can perform polynomial Hash queries, Extract queries and Signature queries.

Forgery: the adversary A submits (i*,PK,μ*,σ*), if the following conditions are true:

  • (1) 

    A did not query the private key of pki*;

  • (2) 

    A did not query (pki*,μ*)’s signature, then A won the game.

The advantage is defined as AdvAforge=Pr[LRSVerify(i*,PK,μ*,σ*)=1].

Definition 6

(Anonymity). The LRS scheme is said to be anonymous if there is no PPT A to win the following games with an advantage that cannot be ignored.

Setup: C calls LRS-SetUp to generate the parameters P and calls LRS-KeyGen to generate the keypair (pki,ski), and sends P and all public keys pki to A.

Query: the A performs a polynomially bounded number of Hash queries, Extract queries and Signature queries.

Challenge: C selects b{0,1} and calls LRS-Sign (b,PK,skib,μ) (where PK, skib and μ are corresponding to the ring, the private key and the message respectively) to generate the signature σb,PK,skib,μ. A did not query (b,PK,skib,μ)’s signature.

Guess: A outputs b as a guess of b. If b=b, then A wins the game.

The advantage is defined as AdvAanon=|Pr[b=b]12|.

Definition 7

(Linkability). LRS scheme is said to be linkable if for PPT A to win the following games with an advantage that cannot be ignored.

Setup: C calls LRS-SetUp to generate the parameters P and calls LRS-KeyGen to generate teh keypair (pki,ski), and sends P and all public keys pki to A.

Query: the A performs a polynomially bounded number of Hash queries, Extract queries and Signature queries.

Challenge: C selects b{0,1} and calls LRS-Sign (b,PK,skib,μ) (where PK, skib and μ are corresponding to the ring, the private key and the message respectively) to generate the signature σb,PK,skib,μ. A did not query (b,PK,skib,μ)’s signature.

Guess: A outputs bit b as a guess of b. If b=b and b1b, then A wins the game.

The advantage is defined as AdvAlink=|Pr[b=bb1b]|.

4. Construction of Our LRS

The LRS consists of five PPT algorithms: ParamGen, KeyGen, Sign, Verify and Link. The parameter settings are as follows:

D: {fD:fmn1.5logn+nlogn}.

Dc: {fD:f1}.

Dy: {fD:fmn1.5logn}.

G: {fD:fmn1.5lognnlogn}.

H: {0,1}*Gm.

H1: {0,1}*Dym.

H2: {0,1}*Dc.

H: a family of hash function: DmD.

4.1. LRS-Setup

Step 1. Pick kZ+.

Step 2. Pick n=2λ, where λZ+ and λ>k. Let m=3logn.

Step 3. Pick p as a prime and p>n4, p3mod8.

Step 4. Pick h$H.

Step 5. Output P=(k,n,m,h).

4.2. LRS-KeyGen

Step 1. Pick s^$Dcm.

Step 2. Compute P=h(s^).

Step 3. Output (pk,sk)=(P,s^).

4.3. LRS-Sign

Input a message μ, a ring PK={Pi}i[l]D, a private key s^j associated to the public key PjPK, and do the following:

Step 1. For i[l]{j}, compute u^i=H(PK{Pi},s^j).

Step 2. For i=j, compute u^j=H1(PK{Pj},s^j).

Step 3. Compute Rj=h(u^j).

Step 4. Compute cj+1=H2(μ,Rj).

Step 5. Compute

Rj+1=h(u^j+1)cj+1·Pj+1cj+2=H2(μ,Rj+1)Rj+2=h(u^j+2)cj+2·Pj+2cj+3=H2(μ,Rj+2)Rl1=h(u^l1)cl1·Pl1cl=H2(μ,Rl1)Rl=h(u^1)cl·Plc1=H2(μ,Rl)R1=h(u^1)c1·Plc2=H2(μ,R1)Rj1=h(u^j1)cj1·Pj1cj=H2(μ,Rj1)

Step 6. For i=j, compute z^j=u^j+cjs^. If z^jDym does not hold, then go back to reselect public keys.

Step 7. For i[l]{j}, z^i=u^i.

Step 8. Output σ=(z^1,z^2,,z^l,cl).

4.4. LRS-Verify

Input the message μ, the ring PK, the signature σ=(z^1,z^2,,z^l,cl), and check the following steps:

Step 1. Compute

Rl=h(z^l)cl·Plcl+1=H2(μ,Rl)Rl+1=h(z^1)cl+1·P1cl+2=H2(μ,Rl+1)R2l1=h(z^l1)c2·Pl1c2l=H2(μ,R2l1)

Step 2. If c2l=cl, then output “1”, otherwise output “0”.

4.5. LRS-Link

Input two valid signatures σ0=(z^10,z^20,,z^l0,cl0), σ1=(z^11,z^21,,z^l1,cl1) and do the following:

Step 1. If |{z^10,z^20,,z^l0}{z^11,z^21,,z^l1}|l1 holds, then output “0”.

Step 2. Otherwise, output “1”.

4.6. LRS-Correctness

  • 1.

    From Corollary 6.2 of [27], we obtain that the probability of z^jGm is approximately 1/e;

  • 2.

    We need to show Rj=h(u^j)=h(z^j)cj·Pj. Since z^j=u^j+cjs^, we have Rj=h(u^j)=h(z^jcjs^)=h(z^j)cjh(s^)=h(z^j)cjPj.

4.7. Construction of Our RS

By changing the first and second steps of the LRS-Sign, the following ring signature scheme (RS) can be obtained.

The parameter setting is the same as LRS

RS-Setup

This part is the same as LRS-Setup.

RS-KeyGen

This part is the same as LRS-KeyGen.

RS-Sign

Input μ, a ring PK={Pi}i[l]D, a private key s^j associated to PjPK, and do the following:

Step 1. For i[l]{j}, picks u^i$Dym.

Step 2. For i=j, pick u^j$Gm.

Step 3. Compute Rj=h(u^j).

Step 4. Compute cj+1=H2(μ,Rj).

Step 5. Compute

Rj+1=h(u^j+1)cj+1·Pj+1cj+2=H2(μ,Rj+1)Rj+2=h(u^j+2)cj+2·Pj+2cj+3=H2(μ,Rj+2)Rl1=h(u^l1)cl1·Pl1cl=H2(μ,Rl1)Rl=h(u^1)cl·Plc1=H2(μ,Rl)R1=h(u^1)c1·Plc2=H2(μ,R1)Rj1=h(u^j1)cj1·Pj1cj=H2(μ,Rj1)

Step 6. For i=j, compute z^j=u^j+cjs^. If z^jDym does not hold, then go back to reselect public keys.

Step 7. For i[l]{j}, z^i=u^i

Step 8. Output σ=(z^1,z^2,,z^l,cl).

RS-Vrify

This part is the same as LRS-Vrify.

5. Security Analysis

We will prove that our LRS satisfies unforgeability, anonymity and linkability.

Theorem 2

(Unforgeability). If there is a PPT algorithm A which can forge the LRS signature with probabilistic ϵ at most q times random oracle H. Then for h$H(D,m), there is a PPT algorithm B that outputs a solution to Col(h,D) with probability at least

(ϵ1|Dc|)(ε1|Dc|q1|Dc|)1|Dc|.

Proof of Theorem 2.

B gives an hH(D,m), picks a secret key s^$Dcm and computes the public key P=h(s^).

B creates two empty lists L1,L2 to record the queries of adversary A.

Setup: Executing the LRS-Setup, B gives A the parameters P=(k,n,m,h).

Query: For the ring PK={Pi}i[l]D, where Pl=P, B performs the following operations:

Hash query:

  • 1.

    A sends message μ to B. For i[l1], B picks y^iDym and y^lGm. B queries L1 and returns the same record if there is already the query;

  • 2.
    Otherwise, B picks clDc and passes cl to A. B records
    (μ,PK,(y^1,y^2,,y^l),cl)
    to L1.

Extract query:

  • 1.

    B queries L2 first. If (Pl,s^i) has already been queried, B returns (Pl,s^i);

  • 2.

    Otherwise, B picks s^iDcm, and passes to A. B records (Pl,s^i) to L2.

Sign query:

A sends message μ, the ring PK={Pi}i[l]D, where Pl=P. B operates as follows:

  • 1.

    B checks L1. If (μ,PK,(y^1,y^2,,y^l),cl) does not exist, go to Hash query and record (μ,PK,(y^1,y^2,,y^l),cl) in L1.

  • 2.

    B checks L2. If (Pi,s^i) does not exist, go to Extract query and record (Pi,s^i) in L2.

  • 3.

    B checks L1 and L2. B seeks the record (μ,P,(y^1,y^2,,y^l),cl) in L1 and the record (Pl,s^i) in L2;

  • 4.

    Let z^j=y^j(jl), z^l=y^l+cls^, B returns the signature (z^1,z^2,,z^l,cl).

Forgery:

A sends a message μ*, the ring

PK*={Pi1*,Pi2*,,Pil*}D

and forges signature (z^1*,z^2*,,z^l*,cl*) by the real signer Pil* to B, the following hold:

  • 1.

    A has not inquired the private key of the public key Pil*;

  • 2.

    A has not inquired (PK*,μ*)’s signature.

Suppose the signature (z^1*,z^2*,,z^l*,cl*) is legal signature of message μ* and PK*. B first queries L1 to find (μ*,PK*,(y^1*,y^2*,,y^l*),cl*) and queries L2 to find (Pil*,s^il*). If (μ*,PK*,(y^1*,y^2*,,y^l*),cl*) is not in L1, the game ends. Otherwise, since (z^1*,z^2*,,z^l*,cl*) can pass the verification, we obtain

h(y^l*)=h(z^l*cl*s^il*)=h(z^l*)cl*Pil*. (1)

B answers A’s query again and answers all queries consistently except Hash returned by the cl query. By Lemma 3.1 in [30], A produces another forged signature (z^1,z^2,,z^l,cl), we obtain

h(y^l*)=h(z^lcls^il*)=h(z^l)clPil*. (2)

From (1) and (2), we obtain h(z^l*cl*s^il*)=h(z^lcls^il*). If z^l*cl*s^il*z^lcls^il*, since z^l*cl*s^il*,z^lcls^il*Dym, we solved the problem Col(h,D).

B extracts the secret key s^ of Pl, and lets zi=y^i* (if il), z^l=y^l*+cls^. It is easy to see that (z^1,z^2,,z^l,cl) can pass the verification, so

h(y^l*)=h(z^lcl*s^)=h(z^l)cl*Pil*. (3)

B continues the calculation. Let zi=y^i* (if il), z^l=y^l*+cls^. We will obtain (z^1,z^2,,z^l,cl) can pass the verification, so

h(y^l*)=h(z^lcls^)=h(z^l)clPil*. (4)

From (1) and (3), we obtain h(z^l*)=h(z^l). If z^l*z^l, since z^l*,z^lGm, we solved the problem Col(h,D).

From (2) and (4), we obtain h(z^l)=h(z^l). If z^lz^l, since z^l,z^lGm, we also solved the problem Col(h,D).

If z^l*cl*s^il*=z^lcls^il*, z^l*=z^l, z^l=z^l, from (3) and (4), we obtain h(z^l*cl*s^)=h(z^lcls^). As discussed in Theorem 6.6 in [27], we can get z^l*cl*s^z^lcls^.

If

z^l*cl*s^=z^lcls^, (5)

from (5) and z^l*cl*s^il*=z^lcls^il*, we obtain

(s^il*s^)(cl*cl)=0.

Since s^il*1,s^1,cl*1,cl1, we obtain s^il*s^2,cl*cl2, so (s^il*s^)(cl*cl)4n.

Since p>n4, 4np2, so the product (s^il*s^)(cl*cl) is 0 in the ring Zp[x]/xn+1, it also must be 0 in the ring Zp[x]/xn+1. Because xn+1 is irreducible over the integers, Zp[x]/xn+1 is an integral domain, therefore either s^il*s^=0 or cl*cl=0. Since cl*cl and s^il*s^, so

z^l*cl*s^z^lcls^.

Thus the problem Col(h,D) was solved.

Suppose the probability that B can successfully solve Col(h,D) is ϵ.

When (z^1*,z^2*,,z^l*,cl*) is not in L1, the probability that cl* passing the LRS-verify is 1|Dc|.

By Lemma 3.1 in [30], we get that the probability of Equation (2) is

(ϵ1|Dc|)(ε1|Dc|q1|Dc|).

From the above analysis, we can see that

ε(ϵ1|Dc|)(ε1|Dc|q1|Dc|)1|Dc|.

From Theorem 1, we obtain that Col(h,D) is based on solving (xn+1)Svpγ(L) (where γ=O˜(n3)) for every lattice L corresponding to an ideal D. □

Theorem 3

(Anonymity). For b{0,1}, σb,PK,skib,μ are the outputs of the algorithm LRS-Sign (b,PK,skib,μ), where PK, skib and μ are corresponding to the ring, the private key and the message respectively. For any PPT adversary, when ski0 and ski1 are unknown, then

Δ(σ0,P,skib,μ,σ1,P,skib,μ)=0.

Therefore, LRS is anonymous.

Proof of Theorem 3.

Setup: This part is the same as in Theorem 2.

Query: This part is the same as Theorem 2.

Challenge: C selects the message μ, keypair (pkib,skib), the ring PK and pkibPK, then randomly selects b{0,1} and calls LRS-Sign(b,PK,skib,μ) to generate the signature σb,PK,skib,μ.

Guess: A outputs b.

Suppose the signature with private key ski0 outputs

σ0,P,ski0,μ=(z^10,z^20,,z^l0,cl0),

the signature with private key ski1 outputs

σ1,P,ski1,μ=(z^11,z^21,,z^l1,cl1).

The following only need to prove that σ0,P,ski0,μ and σ1,P,ski1,μ are statistically indistinguishable.

From Proposition 8.9, 8.10 of [29] and trigonometric inequality, we can get

Δ(σ0,P,ski0,μ,σ1,P,ski1,μ)=Δ((z^10,z^20,,z^l0,cl0),(z^11,z^21,,z^l1,cl1))Δ((P1,P2,,Pl,ski0),(P1,P2,,Pl,ski1))Δ(ski0,ski1)=12a^Dcm|Pr[ski0=a^]Pr[ski1=a^]|=12a^Dcm|1|Dcm|1|Dcm||=0.

Theorem 4

(Linkability). If H is collision resistant and the number of ring members is not less than three, then the LRS signature scheme is linkable.

Proof of Theorem 4.

Setup: This part is the same as in Theorem 2.

Query: This part is the same as Theorem 2.

Challenge:

  • 1.
    C hands a message μ and uses the LRS-KeyGen to generate key pair
    (Pk0,s^k0),(Pk1,s^k1).
  • 2.

    C picks the ring PK={Pi}i[l] and {Pk0,Pk1}PK. C calls LRS-Sign to generate the signatures σ0=(z^10,z^20,,z^l0,cl0) and σ1=(z^11,z^21,,z^l1,cl1).

  • 3.

    C picks b{0,1}, then reselects μ* and uses the ring PK={Pi}i[l] to call the LRS-KeyGen to generate the signature σb=(z^1b,z^2b,,z^lb,clb). C sends σb to A.

Guess: A outputs bit b.

A decides which of

|{z^10,z^20,,z^l0}{z^1b,z^2b,,z^lb}|l1

and

|{z^11,z^21,,z^l1}{z^1b,z^2b,,z^lb}|l1

holds. If the first is true, output b=0, if the second is true, output b=1.

Next, we will discuss it in two ways.

  • 1.

    When s^kb=s^k0, because the ring PK={Pi}i[l] is the same and the calculated u^i is the same, there is at most one output z^i of the signature output which is different from the real signer’s subscript, so there are identical z^i at least l1. That is, when the signature is signed by the same private key for different messages, it can be completely determined.

  • 2.

    when s^kbs^k0, because the ring PK={Pi}i[l] is the same and H is strong anti-collision, when calculating u^i=H(PK{Pi},s^j), the probability that the hash values u^i=H(PK{Pi},s^kb) and u^i=H(PKPi,s^k0) are equal can be negligible. Therefore, only one probability is negligible at most with the same output value as the real signer subscript.

Since there are at least three ring members and at least two z^i’s are not the same, when the signature is not the same signer, it can be determined with overwhelming probability.

6. Efficiency Analysis

In Table 2, we set θ=mn1.5lognnlogn and l is the number of ring members. From Table 2, we may conclude that the public key, secret key and signature sizes of our scheme are equal to the scheme in [23], the size of the signature is smaller than the scheme in [3], and the size of the signature is larger than the scheme in [15].

Table 2.

Communication overhead comparison (in bits).

Scheme Public Key Secret Key Signature
GW [3] mnlogp 2mnlogp 2mnlogθ+2ln+(m+1)nlogp
AM [15] nlogp 2nlogp nllogp
AM [23] mnlogp 2mnlogp 2mnlogθ+2n
RS mnlogp 2mnlogp 2mnlogθ+2n
LRS mnlogp 2mnlogp 2mnlogθ+2n

In Table 3, m is the number of components of a polynomial vector and l is the number of ring members. When calculating the time complexity, some lightweight operations (hash function and random number selecting) are not taken into account. It mainly calculates the time cost of polynomial multiplication (TMul) and polynomial inversion (TInv). The runtime of the discrete Gaussian sampling algorithm, the rejection sampling algorithm, the trapdoor generation algorithm and the SamplePre algorithm [15] are represented by TSd, TRs, TTrap and TSam, respectively. In [15], TTrap, TSam, TSd and TRs are used for keypair and the signature. From Table 3, we may conclude that the signature cost and the verification cost in our scheme are smaller than the scheme in [3], and the keypair cost is smaller than the scheme in [3,23].

Table 3.

Comparison of time costs.

Scheme Keypair Signature Verification
GW [3] (2m1)TMul+TInv (2l+4m+3l2)TMul (2lm+3)TMul
YQ [15] TMul+TTrap+TSam lTMul+2TSd+2TRs lTMul
AM [23] (2m1)TMul+TInv (lm+m)TMul (lm+1)TMul
RS mTMul (lm+m+l1)TMul (lm+l)TMul
LRS mTMul (lm+m+l1)TMul (lm+l)TMul

Table 4 shows the comparison of our signature scheme with the other four schemes in terms of their functionality. The deniable ring signature can prove that the ring member has not signed the signature when necessary. The linkable ring signature can determine whether two signatures are those of the same signer in the ring member. Both the deniable ring signature and the linkable ring signature are ring signatures with special properties, which can be applied to special real situations. From Table 4, we may conclude that LRS and YQ [15] are linkable and secure in case of a quantum attack.

Table 4.

Comparison of functionality.

Scheme Quantum-Resistance Deniability Linkability
LJ [11] No No Yes
GW [3] Yes Yes No
YQ [15] Yes No Yes
AM [23] Yes No No
RS Yes No No
LRS Yes No Yes

7. Conclusions

In this paper, the LRS is constructed based on the SVPγ(L) problem. In LRS, the linkable label is embedded into the randomly selected vector of the signature process in the constructed signature scheme in [23], which means that although the signature output form of our scheme is the same as in the scheme in [23], our scheme is linkable. In the future, we hope to construct a linkable and deniable ring signature scheme.

Author Contributions

Writing, editing, original draft, methodology and formal analysis, C.C.; Reviewing, revising and innovative ideas, L.Y.; Reviewing, editing and formal analysis, G.H. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

This research is partially supported by the National Natural Science Foundation of China (No.61772166) and the Key Program of the Natural Science Foundation of Zhejiang Province of China (No. LZ17F020002).

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Rivest R.L., Shamir A. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Springer; Berlin/Heidelberg, Germany: 2001. How to leak a secret; pp. 552–565. [Google Scholar]
  • 2.Komano Y., Ohta K., Shimbo A., Kawamura S.I. Proceedings of the Cryptographers’ Track at the RSA Conference. Springer; Berlin/Heidelberg, Germany: 2006. Toward the fair anonymous signatures: Deniable ring signatures; pp. 174–191. [Google Scholar]
  • 3.Gao W., Chen L., Hu Y., Newton C.J., Wang B., Chen J. Lattice-based deniable ring signatures. Int. J. Inf. Secur. 2019;18:355–370. doi: 10.1007/s10207-018-0417-1. [DOI] [Google Scholar]
  • 4.Zhang F., Kim K. Proceedings of the Australasian Conference on Information Security and Privacy. Springer; Berlin/Heidelberg, Germany: 2003. Efficient id-based blind signature and proxy signature from bilinear pairings; pp. 312–323. [Google Scholar]
  • 5.Herranz J., Sáez G. Proceedings of the International Conference on Information and Communications Security. Springer; Berlin/Heidelberg, Germany: 2004. New identity-based ring signature schemes; pp. 27–39. [Google Scholar]
  • 6.Xu F., Lv X. A new identity-based threshold ring signature scheme; Proceedings of the 2011 IEEE International Conference on Systems, Man, and Cybernetics; Anchorage, AK, USA. 9–12 October 2011; pp. 2646–2651. [Google Scholar]
  • 7.Deng L., Zeng J. Two new identity-based threshold ring signature schemes. Theor. Comput. Sci. 2014;535:38–45. doi: 10.1016/j.tcs.2014.04.002. [DOI] [Google Scholar]
  • 8.Jia X., He D., Xu Z., Liu Q. An efficient identity-based ring signature over a lattice (in chinese) J. Cryptologic Res. 2017;4:392–404. [Google Scholar]
  • 9.Deng L., Jiang Y., Ning B. Identity-based linkable ring signature scheme. IEEE Access. 2019;7:153969–153976. doi: 10.1109/ACCESS.2019.2948972. [DOI] [Google Scholar]
  • 10.El Kaafarani A., Chen L., Ghadafi E., Davenport J. Proceedings of the International Conference on Cryptology and Network Security. Springer; Berlin/Heidelberg, Germany: 2014. Attributebased signatures with user-controlled linkability; pp. 256–259. [Google Scholar]
  • 11.Liu J.K., Wei V.K., Wong D.S. Proceedings of the Australasian Conference on Information Security and Privacy. Springer; Berlin/Heidelberg, Germany: 2004. Linkable spontaneous anonymous group signature for ad hoc groups; pp. 325–335. [Google Scholar]
  • 12.Au M.H., Chow S.S., Susilo W., Tsang P.P. Proceedings of the European Public Key Infrastructure Workshop. Springer; Berlin/Heidelberg, Germany: 2006. Short linkable ring signatures revisited; pp. 101–115. [Google Scholar]
  • 13.Noether S., Mackenzie A. Ring confidential transactions. Ledger. 2016;1:1–18. doi: 10.5195/ledger.2016.34. [DOI] [Google Scholar]
  • 14.Tang Y., Xia F., Ye Q., Wang M., Mu R., Zhang X. Identity-based Linkable Ring Signature on NTRU Lattice. Secur. Commun. Netw. 2021;2021:9992414. doi: 10.1155/2021/9992414. [DOI] [Google Scholar]
  • 15.Ye Q., Wang M., Meng H. Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity. Comput. Intell. Neurosci. 2022;2022:8431874. doi: 10.1155/2022/8431874. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 16.Herranz J., Sáez G. Proceedings of the International Conference on Cryptology in India. Springer; Berlin/Heidelberg, Germany: 2003. Forking lemmas for ring signature schemes; pp. 266–279. [Google Scholar]
  • 17.Shacham H., Waters B. Proceedings of the International Workshop on Public Key Cryptography. Springer; Berlin/Heidelberg, Germany: 2007. Efficient ring signatures without random oracles; pp. 166–180. [Google Scholar]
  • 18.Zhang F., Safavi-Naini R., Susilo W. Proceedings of the International Workshop on Public Key Cryptography. Springer; Berlin/Heidelberg, Germany: 2004. An efficient signature scheme from bilinear pairings and its applications; pp. 277–290. [Google Scholar]
  • 19.Islam S.K.H., Das A.K., Khan M.K. Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor. Secur. Commun. Netw. 2016;9:3229–3238. doi: 10.1002/sec.1528. [DOI] [Google Scholar]
  • 20.Gentry C., Peikert C., Vaikuntanathan V. Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing. Association for Computing Machinery; New York, NY, USA: 2008. Trapdoors for hard lattices and new cryptographic constructions; pp. 197–206. [Google Scholar]
  • 21.Kawachi A., Tanaka K., Xagawa K. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Springer; Berlin/Heidelberg, Germany: 2004. Concurrently secure identification schemes based on the worst-case hardness of lattice problems; pp. 372–389. [Google Scholar]
  • 22.Cayrel P.L., Lindner R., Ru¨ckert M., Silva R. Proceedings of the International Conference on Cryptology and Information Security in Latin America. Springer; Berlin/Heidelberg, Germany: 2010. A lattice-based threshold ring signature scheme; pp. 255–272. [Google Scholar]
  • 23.Melchor C.A., Bettaieb S., Boyen X., Fousse L. Proceedings of the International Conference on Cryptology in Africa. Springer; Berlin/Heidelberg, Germany: 2013. Adapting lyubashevsky’s signature schemes to the ring signature setting; pp. 1–25. [Google Scholar]
  • 24.Lyubashevsky V. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Springer; Berlin/Heidelberg, Germany: 2009. Fiat-shamir with aborts: Applications to lattice and factoring-based signatures; pp. 598–616. [Google Scholar]
  • 25.Torres W.A.A., Steinfeld R., Sakzad A., Liu J.K. Proceedings of the Australasian Conference on Information Security and Privacy. Springer; Berlin/Heidelberg, Germany: 2018. Post-quantum onetime linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) pp. 558–576. [Google Scholar]
  • 26.Baum C., Lin H., Oechsner S. Proceedings of the International Conference on Information and Communications Security. Springer; Berlin/Heidelberg, Germany: 2018. Towards practical lattice-based one-time linkable ring signatures; pp. 303–322. [Google Scholar]
  • 27.Lyubashevsky V. Ph.D. Thesis. University of California; San Diego, CA, USA: 2008. Towards Practical Lattice-Based Cryptography. [Google Scholar]
  • 28.Lyubashevsky V., Micciancio D. Proceedings of the International Colloquium on Automata, Languages, and Programming. Springer; Berlin/Heidelberg, Germany: 2006. Generalized compact knapsacks are collision resistant; pp. 144–155. [Google Scholar]
  • 29.Micciancio D., Goldwasser S. Complexity of Lattice Problems: A Cryptographic Perspective. Volume 671 Springer; Berlin/Heidelberg, Germany: 2002. (The Kluwer International Series in Engineering and Computer Science). [Google Scholar]
  • 30.Bellare M., Neven G. Proceedings of the 13th ACM Conference on Computer and Communications Security, Association for Computing Machinery. Association for Computing Machinery; New York, NY, USA: 2006. Multi-signatures in the plain public-key model and a general forking lemma; pp. 390–399. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES