Short DL-Based Blacklistable Ring Signatures from DualRing

被引:0
|
作者
Nakanishi, Toru [1 ]
Iriboshi, Atsuki [1 ]
Imai, Katsunobu [1 ]
机构
[1] Hiroshima Univ, Grad Sch Adv Sci & Engn, Higashihiroshima 7398527, Japan
关键词
ring signatures; DualRing; blacklist; decentralized anonymous credentials; ANONYMOUS CREDENTIALS;
D O I
10.1587/transfun.2023TAP0008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of privacy -enhancing authentications suitable for decentralized environments, ring signatures have intensively been researched. In ring signatures, each user can choose any ad -hoc set of users (specified by public keys) called a ring, and anonymously sign a message as one of the users. However, in applications of anonymous authentications, users may misbehave the service due to the anonymity, and thus a mechanism to exclude the anonymous misbehaving users is required. However, in the existing ring signature scheme, a trusted entity to open the identity of the user is needed, but it is not suitable for the decentralized environments. On the other hand, as another type of anonymous authentications, a decentralized blacklistable anonymous credential system is proposed, where anonymous misbehaving users can be detected and excluded by a blacklist. However, the DL -based instantiation needs O ( N ) proof size for the ring size N . In the research line of the DL -based ring signatures, an efficient scheme with O (log N ) signature size, called DualRing , is proposed. In this paper, we propose a DL -based blacklistable ring signature scheme extended from DualRing, where in addition to the short O (log N ) signature size for N , the blacklisting mechanism is realized to exclude misbehaving users. Since the blacklisting mechanism causes additional costs in our scheme, the signature size is O (log N + <euro> ), where <euro> is the blacklist size.
引用
收藏
页码:464 / 475
页数:12
相关论文
共 50 条
  • [21] ML/DL-based Signal Integrity Optimization for InFO Routing
    Kang, Bo-Kai
    Chang, Hao-Ju
    Chen, Hung-Ming
    Liu, Chien-Nan Jimmy
    2024 22ND IEEE INTERREGIONAL NEWCAS CONFERENCE, NEWCAS 2024, 2024, : 343 - 347
  • [22] Tao: Re-Thinking DL-based Microarchitecture Simulation
    Pandey, Santosh
    Yazdanbakhsh, Amir
    Liu, Hang
    PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2024, 8 (02)
  • [23] Linearized Analysis of Noise and Resolution for DL-Based Image Generation
    Xu, Jingyan
    Noo, Frederic
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2023, 42 (03) : 647 - 660
  • [24] TAO: Re-Thinking DL-based Microarchitecture Simulation
    Pandey S.
    Yazdanbakhsh A.
    Liu H.
    Performance Evaluation Review, 2024, 52 (01): : 23 - 24
  • [25] QA of DL-based dose calculations: determination of the application range
    Tsekas, G.
    Bol, G.
    Raaymakers, B. W.
    Kontaxis, C.
    RADIOTHERAPY AND ONCOLOGY, 2021, 161 : S56 - S57
  • [26] Gearbox fault diagnosis: A DL-based nonparametric filter approach
    Kumar, Vikash
    Gupta, Dipak
    Sarangi, Somnath
    JOURNAL OF VIBRATION AND CONTROL, 2025,
  • [27] A Dynamic Robust DL-Based Model for Android Malware Detection
    Ul Haq, Ikram
    Khan, Tamim Ahmed
    Akhunzada, Adnan
    IEEE ACCESS, 2021, 9 : 74510 - 74521
  • [28] Adopting GPU computing to support DL-based Earth science applications
    Wang, Zifu
    Li, Yun
    Wang, Kevin
    Cain, Jacob
    Salami, Mary
    Duffy, Daniel Q. Q.
    Little, Michael M. M.
    Yang, Chaowei
    INTERNATIONAL JOURNAL OF DIGITAL EARTH, 2023, 16 (01) : 2660 - 2680
  • [29] Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing
    Bao, Zijian
    He, Debiao
    Liu, Yulin
    Peng, Cong
    Feng, Qi
    Luo, Min
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 56 - 70
  • [30] Realism versus Performance for Adversarial Examples Against DL-based NIDS
    Alatwi, Huda Ali
    Morisset, Charles
    38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1549 - 1557