The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
En tant qu'authentification améliorant la confidentialité et adaptée aux environnements décentralisés, les signatures en anneau ont fait l'objet de recherches approfondies. Dans les signatures en anneau, chaque utilisateur peut choisir n'importe quel ensemble ad hoc d'utilisateurs (spécifié par des clés publiques) appelé anneau et signer anonymement un message en tant que l'un des utilisateurs. Cependant, dans les applications d'authentification anonyme, les utilisateurs peuvent mal se comporter avec le service en raison de l'anonymat, et un mécanisme permettant d'exclure les utilisateurs anonymes se comportant mal est donc nécessaire. Cependant, dans le schéma de signature en anneau existant, une entité de confiance est nécessaire pour ouvrir l'identité de l'utilisateur, mais elle n'est pas adaptée aux environnements décentralisés. D'autre part, comme autre type d'authentification anonyme, un système décentralisé d'informations d'identification anonymes pouvant être mis sur liste noire est proposé, dans lequel les utilisateurs anonymes qui se comportent mal peuvent être détectés et exclus par une liste noire. Cependant, l'instanciation basée sur DL nécessite O(N) taille d'épreuve pour la taille de la bague N. Dans la ligne de recherche des signatures en anneau basées sur DL, un schéma efficace avec O(Journal N) taille de signature, appelée Double anneau, est proposé. Dans cet article, nous proposons un schéma de signature en anneau sur liste noire basé sur DL, étendu à partir de DualRing, où en plus du court O(Journal N) taille de signature pour N, le mécanisme de liste noire est réalisé pour exclure les utilisateurs qui se comportent mal. Étant donné que le mécanisme de liste noire entraîne des coûts supplémentaires dans notre système, la taille de la signature est O(Journal N+l), où l est la taille de la liste noire.
Toru NAKANISHI
Hiroshima University
Atsuki IRIBOSHI
Hiroshima University
Katsunobu IMAI
Hiroshima University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Toru NAKANISHI, Atsuki IRIBOSHI, Katsunobu IMAI, "Short DL-Based Blacklistable Ring Signatures from DualRing" in IEICE TRANSACTIONS on Fundamentals,
vol. E107-A, no. 3, pp. 464-475, March 2024, doi: 10.1587/transfun.2023TAP0008.
Abstract: As one of privacy-enhancing authentications suitable for decentralized environments, ring signatures have intensively been researched. In ring signatures, each user can choose any ad-hoc set of users (specified by public keys) called a ring, and anonymously sign a message as one of the users. However, in applications of anonymous authentications, users may misbehave the service due to the anonymity, and thus a mechanism to exclude the anonymous misbehaving users is required. However, in the existing ring signature scheme, a trusted entity to open the identity of the user is needed, but it is not suitable for the decentralized environments. On the other hand, as another type of anonymous authentications, a decentralized blacklistable anonymous credential system is proposed, where anonymous misbehaving users can be detected and excluded by a blacklist. However, the DL-based instantiation needs O(N) proof size for the ring size N. In the research line of the DL-based ring signatures, an efficient scheme with O(log N) signature size, called DualRing, is proposed. In this paper, we propose a DL-based blacklistable ring signature scheme extended from DualRing, where in addition to the short O(log N) signature size for N, the blacklisting mechanism is realized to exclude misbehaving users. Since the blacklisting mechanism causes additional costs in our scheme, the signature size is O(log N+l), where l is the blacklist size.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2023TAP0008/_p
Copier
@ARTICLE{e107-a_3_464,
author={Toru NAKANISHI, Atsuki IRIBOSHI, Katsunobu IMAI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Short DL-Based Blacklistable Ring Signatures from DualRing},
year={2024},
volume={E107-A},
number={3},
pages={464-475},
abstract={As one of privacy-enhancing authentications suitable for decentralized environments, ring signatures have intensively been researched. In ring signatures, each user can choose any ad-hoc set of users (specified by public keys) called a ring, and anonymously sign a message as one of the users. However, in applications of anonymous authentications, users may misbehave the service due to the anonymity, and thus a mechanism to exclude the anonymous misbehaving users is required. However, in the existing ring signature scheme, a trusted entity to open the identity of the user is needed, but it is not suitable for the decentralized environments. On the other hand, as another type of anonymous authentications, a decentralized blacklistable anonymous credential system is proposed, where anonymous misbehaving users can be detected and excluded by a blacklist. However, the DL-based instantiation needs O(N) proof size for the ring size N. In the research line of the DL-based ring signatures, an efficient scheme with O(log N) signature size, called DualRing, is proposed. In this paper, we propose a DL-based blacklistable ring signature scheme extended from DualRing, where in addition to the short O(log N) signature size for N, the blacklisting mechanism is realized to exclude misbehaving users. Since the blacklisting mechanism causes additional costs in our scheme, the signature size is O(log N+l), where l is the blacklist size.},
keywords={},
doi={10.1587/transfun.2023TAP0008},
ISSN={1745-1337},
month={March},}
Copier
TY - JOUR
TI - Short DL-Based Blacklistable Ring Signatures from DualRing
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 464
EP - 475
AU - Toru NAKANISHI
AU - Atsuki IRIBOSHI
AU - Katsunobu IMAI
PY - 2024
DO - 10.1587/transfun.2023TAP0008
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E107-A
IS - 3
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - March 2024
AB - As one of privacy-enhancing authentications suitable for decentralized environments, ring signatures have intensively been researched. In ring signatures, each user can choose any ad-hoc set of users (specified by public keys) called a ring, and anonymously sign a message as one of the users. However, in applications of anonymous authentications, users may misbehave the service due to the anonymity, and thus a mechanism to exclude the anonymous misbehaving users is required. However, in the existing ring signature scheme, a trusted entity to open the identity of the user is needed, but it is not suitable for the decentralized environments. On the other hand, as another type of anonymous authentications, a decentralized blacklistable anonymous credential system is proposed, where anonymous misbehaving users can be detected and excluded by a blacklist. However, the DL-based instantiation needs O(N) proof size for the ring size N. In the research line of the DL-based ring signatures, an efficient scheme with O(log N) signature size, called DualRing, is proposed. In this paper, we propose a DL-based blacklistable ring signature scheme extended from DualRing, where in addition to the short O(log N) signature size for N, the blacklisting mechanism is realized to exclude misbehaving users. Since the blacklisting mechanism causes additional costs in our scheme, the signature size is O(log N+l), where l is the blacklist size.
ER -