Traceable Ring Signature
نویسندگان
چکیده
The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No group manager, no special setup, and the dynamics of group choice. The ring signature is, however, vulnerable to malicious or irresponsible signers in some applications, because of its anonymity. In this paper, we propose a traceable ring signature scheme. A traceable ring scheme is a ring signature except that it can restrict “excessive” anonymity. The traceable ring signature has a tag that consists of a list of ring members and an issue that refers to, for instance, a social affair or an election. A ring member can make any signed but anonymous opinion regarding the issue, but only once (per tag). If the member submits another signed opinion, possibly pretending to be another person who supports the first opinion, the identity of the member is immediately revealed. If the member submits the same opinion, for instance, voting “yes” regarding the same issue twice, everyone can see that these two are linked. The traceable ring signature can suit to many applications, such as an anonymous voting on a BBS. We formalize the security definitions for this primitive and show an efficient and simple construction in the random oracle model.
منابع مشابه
A traceable optimistic fair exchange protocol in the standard model
An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...
متن کاملAccumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constructing an identitybased (ID-based) ring signature scheme with constant-size signatures and its interactive counterpart, and providing membership revocation to group signature, traceable signature and identity escrow sc...
متن کاملAn Efficient Anonymous Authentication Protocol in Vehicular Ad-hoc Networks
In this paper, we introduce an efficient anonymous authentication protocol in Vehicular Ad-hoc Networks (VANETs) [5] to resolve the issue on anonymous authentication for communication between roadside units and vehicles. Our proposed protocol cannot only guarantee privacy, anonymity, and other basic cryptographic requirements but also provide traceability of illegal users. Our proposed protocol...
متن کاملA Framework for Unique Ring Signatures
We propose a simple, general, and unified framework for constructing unique ring signaturesthat simplify and capture the spirit of linkable ring signatures. The framework, which can beefficiently instantiated in the random oracle and the standard model, is obtained by generalizingthe Bellare-Goldwasser “PRF made public” paradigm. Security of the first instantiation can betightly...
متن کاملPoster: Towards Blockchain Transaction Privacy
Blockchains allow users to transfer money securely to possibly unknown and untrusted counterparties, without requiring a trusted intermediary. Transactions contain the value being transferred, and sender and recipient identifiers (known as addresses) in the clear, meaning that although onchain addresses are unlinked from off-chain identities, monetary movements are easily traceable. We explore ...
متن کامل