Short DL-Based Blacklistable Ring Signatures from DualRing

被引:0
|
作者
Nakanishi, Toru [1 ]
Iriboshi, Atsuki [1 ]
Imai, Katsunobu [1 ]
机构
[1] Hiroshima Univ, Grad Sch Adv Sci & Engn, Higashihiroshima 7398527, Japan
关键词
ring signatures; DualRing; blacklist; decentralized anonymous credentials; ANONYMOUS CREDENTIALS;
D O I
10.1587/transfun.2023TAP0008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of privacy -enhancing authentications suitable for decentralized environments, ring signatures have intensively been researched. In ring signatures, each user can choose any ad -hoc set of users (specified by public keys) called a ring, and anonymously sign a message as one of the users. However, in applications of anonymous authentications, users may misbehave the service due to the anonymity, and thus a mechanism to exclude the anonymous misbehaving users is required. However, in the existing ring signature scheme, a trusted entity to open the identity of the user is needed, but it is not suitable for the decentralized environments. On the other hand, as another type of anonymous authentications, a decentralized blacklistable anonymous credential system is proposed, where anonymous misbehaving users can be detected and excluded by a blacklist. However, the DL -based instantiation needs O ( N ) proof size for the ring size N . In the research line of the DL -based ring signatures, an efficient scheme with O (log N ) signature size, called DualRing , is proposed. In this paper, we propose a DL -based blacklistable ring signature scheme extended from DualRing, where in addition to the short O (log N ) signature size for N , the blacklisting mechanism is realized to exclude misbehaving users. Since the blacklisting mechanism causes additional costs in our scheme, the signature size is O (log N + <euro> ), where <euro> is the blacklist size.
引用
收藏
页码:464 / 475
页数:12
相关论文
共 50 条
  • [31] A DL-based Approach for Eliminating Concept Restriction Conflicts in Ontology Merging
    Lu, Yao
    Zhang, Guoyi
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 446 - 451
  • [32] A Hybrid DL-Based Detection Mechanism for Cyber Threats in Secure Networks
    Qureshi, Sirajuddin
    He, Jingsha
    Tunio, Saima
    Zhu, Nafei
    Akhtar, Faheem
    Ullah, Faheem
    Nazir, Ahsan
    Wajahat, Ahsan
    IEEE ACCESS, 2021, 9 : 73938 - 73947
  • [33] An Application of Fuzzy DL-Based Semantic Perception to Soil Container Classification
    Eich, Markus
    2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR PRACTICAL ROBOT APPLICATIONS (TEPRA), 2013,
  • [34] DL-Based The Knowledge Description of Emergency Plan Systems and Its Application
    Dong CunXiang
    Wang WenJun
    Yang Peng
    THIRD INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING (MUE 2009), 2009, : 364 - 368
  • [35] Medical Image Classification Using DL-based Feature Extraction in IoMT
    Thimmapuram M.
    Salvadi S.R.
    Pallati N.
    Aluvalu R.
    Recent Patents on Engineering, 2024, 18 (09)
  • [36] Exploring the performance of the DL-based OTFS detection scheme in Internet of vehicles
    Gong, Yi
    Li, Qingyu
    Liu, Lei
    Meng, Fanke
    Hou, Xiangwang
    Xu, Zhan
    VEHICULAR COMMUNICATIONS, 2023, 43
  • [37] Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification
    Jiang, Zenghui
    Zeng, Weijun
    Zhou, Xingyu
    Feng, Peilun
    Chen, Pu
    Yin, Shenqian
    Han, Changzhi
    Li, Lin
    ELECTRONICS, 2023, 12 (18)
  • [38] DLCP2F: a DL-based cryptocurrency price prediction framework
    Aljadani A.
    Discover Artificial Intelligence, 2022, 2 (01):
  • [39] Short linkable ring signatures revisited
    Au, Man Ho
    Chow, Sherman S. M.
    Susilo, Willy
    Tsang, Patrick P.
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2006, 4043 : 101 - 115
  • [40] Tool makes VH DL-based programmable-logic design ''easy''
    Lipman, J
    EDN, 1997, 42 (09) : 12 - 12