Abstract

In this paper, we present an effective code-based linkable ring signature scheme based on Borromean ring signature. The security of the scheme is based on the hardness of Syndrome Decoding problem, General Syndrome Decoding problem and Codeword Finding problem. We prove that our scheme has all the properties that a linkable ring signature scheme should have: unforgeability, anonymity, linkability and non-slanderability. Efficiency analysis shows that our scheme has a smaller signature size than the existing scheme under the same security conditions. Furthermore, this signature scheme can be easily extended to multiple layers. That is, code-based multilayer linkable ring signature scheme can be obtained and used for transactions with multiple inputs.

Highlights

  • We focus on construction of code-based linkable ring signature scheme

  • OUR CONTRIBUTION Using the same structure as Monero’s in [8], [9], we present an effective code-based linkable ring signature scheme based on Borromean ring signature [12]

  • We present a code-based multilayer linkable ring signature scheme which can be used for transactions with multiple inputs

Read more

Summary

INTRODUCTION

BACKGROUND Blockchain has been widely used in many fields since its introduction in 2008 [1]–[5], but there are still many problems that restrict its development Such as, how to protect user’s privacy how to prevent double spending. Monero has used this anonymity and linkability in cryptocurrencies to prevent double spending and protect user’s privacy [8], [9] The security of their scheme is based on the discrete logarithm problem of elliptic curves. We focus on construction of code-based linkable ring signature scheme. Y. Ren et al.: On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures TABLE 1. We present a code-based multilayer linkable ring signature scheme which can be used for transactions with multiple inputs. We conclude this work by analyzing the signature size of our scheme

RELATED WORK
SECURITY MODEL OF LINKABLE RING SIGNATURE
CORRECTNESS AND SECURITY ANALYSIS
CORRECTNESS ANALYSIS Theorem 1
VIII. CONCLUSION AND FUTURE WORK
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.