Academic Journal of Computing & Information Science, 2021, 4(8); doi: 10.25236/AJCIS.2021.040809.
Jia Wang1, Jingyuan Li2, Ke Zhang3
1Shaanxi Normal University, Xi’an 710119, China
2Shaanxi Normal University, Xi’an 710119, China
3Shaanxi Normal University, Xi’an 710119, China
Compared with other schemes, the ring signature scheme proposed in this paper has the characteristics of revocable anonymity. When malicious users publish false messages, we can find an effective algorithm to revoke anonymity, calculate the real signer identity in the ring signature members, and ensure the reliability and robustness of the ring signature system. Finally, the scheme is analyzed from the aspects of security and performance, The results show that the ring signature scheme with revocable anonymity in this paper is more secure, more efficient and lower operation cost.
Ring signature, Anonymity, Revocable, encryption algorithm
Jia Wang, Jingyuan Li, Ke Zhang. An efficient anonymous revocable ring signature scheme. Academic Journal of Computing & Information Science (2021), Vol. 4, Issue 8: 48-51. https://doi.org/10.25236/AJCIS.2021.040809.
[1] Ren Y, Guan H, Zhao Q. An efficient lattice-based linkable ring signature scheme with scalability to multiple layer[J]. Journal of Ambient Intelligence and Humanized Computing, 2021:1-10.
[2] Lin T C, Yeh T Y, Hwang M S. Cryptanalysis of an ID-based Deniable Threshold Ring Authentication[J]. International Journal of Network Security, 2019, 21(2):298-302.
[3] GAO, Wen, HU, et al. Efficient Ring Signature Scheme Without Random Oracle from Lattices[J]. Chinese Journal of Electronics, 2019.
[4] Ren Y, Danting X U, Zhang X , et al. Deletable blockchain based on threshold ring signature[J]. Journal on Communications, 2019.
[5] Samra B, FouziSemchedine. A certificateless ring signature scheme with batch verification for applications in VANET[J]. Journal of Information Security and Applications, 2020, 55(December 2020):102669.
[6] Duong D H, Tran H, Susilo W , et al. An efficient multivariate threshold ring signature scheme[J]. Computer Standards & Interfaces, 2020, 74.
[7] Liu F, Wang Q. An Identity-based Batch Verification Scheme for VANETs Based on Ring Signature with Efficient Revocation[J]. 2021.