2020
DOI: 10.1109/access.2020.2981360
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless Linkable Ring Signature Scheme

Abstract: Ring signature is an anonymous signature that both authenticates the message and protects the identity information of the signer. It is suitable for scenarios such as anonymous network access, online auctions, etc. However, there is a problem in a regular ring signature scheme. The signer can generate multiple different signatures for the same message without being discovered by the verifier. This will of course cause some confusion. Linkable ring signature (LRS) resolves the problem. The verifier can determin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…With the introduction of ring signatures by Riverst et al [2], numerous related works (along with the related notion of ring/ad-hoc identification schemes) have been proposed [49][50][51][52][53][54][55][56][57][58][59]. We discuss some of them in this section.…”
Section: Current Workmentioning
confidence: 99%
See 1 more Smart Citation
“…With the introduction of ring signatures by Riverst et al [2], numerous related works (along with the related notion of ring/ad-hoc identification schemes) have been proposed [49][50][51][52][53][54][55][56][57][58][59]. We discuss some of them in this section.…”
Section: Current Workmentioning
confidence: 99%
“…Ke Gu and Na Wu [62] submitted a traceable constant-sized ring signature without random oracles. Moreover, several certificate-less ring signatures schemes [59,[64][65][66] addressed the key-escrow problem of ring signatures.…”
Section: Current Workmentioning
confidence: 99%
“…It adopted CLRSM scheme for completely focusing on message authentication, concealment of the signer identity, and prevents the users from abusing the right of the signer. 17 It derived the benefits of identity-based cryptography of classical public key infrastructure with the support of ring signature that prevents the use of key escrow and certificate management, making it a suitable candidate for securing CRNs with maximized lightweight properties.…”
Section: Motivationmentioning
confidence: 99%
“…This proposed CLRSB specifically used certificateless linkable ring signature method integrated with the blockchain for supporting the SUs toward the thwarting of malicious attacks with confirmed reliability, security, authenticity, consistency of the data exchanged between the nodes in the distributed network. It adopted CLRSM scheme for completely focusing on message authentication, concealment of the signer identity, and prevents the users from abusing the right of the signer 17 . It derived the benefits of identity‐based cryptography of classical public key infrastructure with the support of ring signature that prevents the use of key escrow and certificate management, making it a suitable candidate for securing CRNs with maximized lightweight properties.…”
Section: Introductionmentioning
confidence: 99%
“…A quadratic acceleration for the searching problem can be provided by Grover's algorithm 6 . Most of the existing ring signature schemes can be divided into three types: certificate‐based, identity‐based, 2,7 and certificateless 8,9 . Lattice ciphers are considered to be the most prospective cryptographic primitives in the post‐quantum era and have attracted widespread attention.…”
Section: Introductionmentioning
confidence: 99%