Font Size: a A A

Research On The Scheme Of Linkable Ring Signature

Posted on:2020-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:H SunFull Text:PDF
GTID:2428330572485933Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the development of information network technology reaches all levels of social life,network security and privacy protection become more and more important,and signature is an important research direction of information security.A ring signature allows a member to sign messages on behalf of all spontaneously ring members,and creating a ring signature does not require all ring members to cooperate.This means that the ring signature will no longer have a manager who can eventually reveal the identity of the actual signer.Thus the ring signature has spontaneity,unconditional anonymity and a flexible group structure.Therefore,the ring signature is promoted in practical applications such as hiding the actual operator's information in electronic voting and the user's basic information in the vehicle-mounted self-organizing network and the privacy protection of the vehicle's traveling track.The linkable ring signature can detect whether two signatures are issued by the same signer using the same private key while the anonymity remains unchanged,so many practical applications such as counting and limiting the number of times a particular user accesses network resources within a certain period of time prevents Violations of voting by voters for repeated voting can be resolved by creating a linkable ring signature.Since lattices have the same difficulty in all instances being cracked under any circumstances,various grid-based signature schemes have been proposed,and efficient,flexible and unconditionally anonymized grid-based ring signature schemes have also become a hot research topic.To this end,the paper has carried out the following two aspects of research.(1)A selectable linked and transformable ring signature scheme is created,based on the difficulty of the discrete logarithm problem.First of all,in order to solve the problem of detecting whether two or more different ring signatures are constructed by the same pair of keys,according to the signer's private key and a hash function modeled in a deterministic manner in the random prediction model.Generate a private association tag and add linkable properties to the article.Furthermore,this paper designs a method that can convert ring signatures into ordinary signatures,and solves the problem of revealing the actual identity of anonymous participants in special occasions.It has been verified that this scheme not only resists conversion attacks but also satisfies unforgeability and still maintains strong anonymity.(2)A lattice-based linkable ring signature scheme is constructed,which not only verifies that the discriminant signer of the duplicate signature can make the ring signature reach the unconditional anonymity.The scheme is based on the difficult assumption of the lattice—the problem of small integer solutions on the ring,and under the random prediction model it can be proved that the scheme is unforgeable.The scheme can also be applied in confidential transactions,which form the basis of the post-quantum security cryptocurrency privacy protection protocol.
Keywords/Search Tags:Ring Signature, Linkability, Lattice, Unforgeability, Unconditional Anonymity
PDF Full Text Request
Related items