2021
DOI: 10.1155/2021/7266564
|View full text |Cite
|
Sign up to set email alerts
|

Linkable Ring Signature Scheme Using Biometric Cryptosystem and NIZK and Its Application

Abstract: Biometric encryption, especially based on fingerprint, plays an important role in privacy protection and identity authentication. In this paper, we construct a privacy-preserving linkable ring signature scheme. In our scheme, we utilize a fuzzy symmetric encryption scheme called symmetric keyring encryption (SKE) to hide the secret key and use non-interactive zero-knowledge (NIZK) protocol to ensure that we do not leak any information about the message. Unlike the blind signature, we use NIZK protocol to cance… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…There is a linear relationship between the calculation cost of generating the signature and the number of ring members. Compared to other The number of ring members (n) Computational cost (ms) Ref [37] Ref [38] Ref [39] Ref [40] Our Scheme Fig. 6 Computational cost comparison of key generation ring signature schemes, our computational cost is the lowest.…”
Section: Computational Costmentioning
confidence: 95%
See 4 more Smart Citations
“…There is a linear relationship between the calculation cost of generating the signature and the number of ring members. Compared to other The number of ring members (n) Computational cost (ms) Ref [37] Ref [38] Ref [39] Ref [40] Our Scheme Fig. 6 Computational cost comparison of key generation ring signature schemes, our computational cost is the lowest.…”
Section: Computational Costmentioning
confidence: 95%
“…We set the number of ring members n = 100, compared with Fujisaki et al's scheme [37], Bouakkaz et al's scheme [38], and Lai et al's scheme [40], the key generation consumption of our scheme is reduced by about 31.65%, 61.84%, and 70.34%, respectively. Although, the key generation process cost of our scheme is longer than Mao et al's scheme [39]. However, the tracking key and vehicle key of our scheme is generated in advance by the TA and the vehicle during the vehicle registration process, and stored in the OBU of the vehicle, so it does not affect the communication efficiency of VANETs.…”
Section: Computational Costmentioning
confidence: 96%
See 3 more Smart Citations