Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2021, 4(8); doi: 10.25236/AJCIS.2021.040809.

An efficient anonymous revocable ring signature scheme


Jia Wang1, Jingyuan Li2, Ke Zhang3

Corresponding Author:
Jia Wang

1Shaanxi Normal University, Xi’an 710119, China 

2Shaanxi Normal University, Xi’an 710119, China

3Shaanxi Normal University, Xi’an 710119, China


Compared with other schemes, the ring signature scheme proposed in this paper has the characteristics of revocable anonymity. When malicious users publish false messages, we can find an effective algorithm to revoke anonymity, calculate the real signer identity in the ring signature members, and ensure the reliability and robustness of the ring signature system. Finally, the scheme is analyzed from the aspects of security and performance, The results show that the ring signature scheme with revocable anonymity in this paper is more secure, more efficient and lower operation cost.


Ring signature, Anonymity, Revocable, encryption algorithm

Cite This Paper

Jia Wang, Jingyuan Li, Ke Zhang. An efficient anonymous revocable ring signature scheme. Academic Journal of Computing & Information Science (2021), Vol. 4, Issue 8: 48-51. https://doi.org/10.25236/AJCIS.2021.040809.


[1] Ren Y,  Guan H,  Zhao Q. An efficient lattice-based linkable ring signature scheme with scalability to multiple layer[J]. Journal of Ambient Intelligence and Humanized Computing, 2021:1-10.

[2] Lin T C,  Yeh T Y,  Hwang M S. Cryptanalysis of an ID-based Deniable Threshold Ring Authentication[J]. International Journal of Network Security, 2019, 21(2):298-302.

[3] GAO, Wen, HU, et al. Efficient Ring Signature Scheme Without Random Oracle from Lattices[J]. Chinese Journal of Electronics, 2019.

[4] Ren Y,  Danting X U,  Zhang X , et al. Deletable blockchain based on threshold ring signature[J]. Journal on Communications, 2019.

[5] Samra B, FouziSemchedine. A certificateless ring signature scheme with batch verification for applications in VANET[J]. Journal of Information Security and Applications, 2020, 55(December 2020):102669.

[6] Duong D H,  Tran H,  Susilo W , et al. An efficient multivariate threshold ring signature scheme[J]. Computer Standards & Interfaces, 2020, 74.

[7] Liu F, Wang Q. An Identity-based Batch Verification Scheme for VANETs Based on Ring Signature with Efficient Revocation[J]. 2021.