# American Institute of Mathematical Sciences

May  2020, 14(2): 207-232. doi: 10.3934/amc.2020016

## Efficient traceable ring signature scheme without pairings

 School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, China

* Corresponding author: Ke Gu

Received  February 2018 Revised  March 2019 Published  September 2019

Fund Project: This work is supported by the National Natural Science Foundations of China (No.61402055), the Hunan Provincial Natural Science Foundation of China (No.2018JJ2445) and the Open Research Fund of Key Laboratory of Network Crime Investigation of Hunan Provincial Colleges (No.2017WLFZZC003)

Although currently several traceable (or linkable) ring signature schemes have been proposed, most of them are constructed on pairings. In this paper, we present an efficient traceable ring signature (TRS) scheme without pairings, which is based on the modified EDL signature (first proposed by D.Chaum et al. in Crypto 92). Compared with other ring signature schemes, the proposed scheme does not employ pairing computation and has some computational advantages, whose security can be reduced to the computational Diffie-Hellman (CDH) and decisional Diffie-Hellman (DDH) assumptions in the random oracle model. Also, the proposed scheme is similar to certificateless signature scheme, where user and key generating center make interaction to generate ring key. We give a formal security model for ring signature and prove that the proposed scheme has the properties of traceability and anonymity.

Citation: Ke Gu, Xinying Dong, Linyu Wang. Efficient traceable ring signature scheme without pairings. Advances in Mathematics of Communications, 2020, 14 (2) : 207-232. doi: 10.3934/amc.2020016
##### References:

show all references

##### References:
Performance comparisons of the Six Schemes
 Signature Size Signing Cost Verification Cost Scheme [40] $O(n)$ $(4\cdot n+3)\cdot e_1+2\cdot n\cdot m_1$ $4\cdot n\cdot e_1+n\cdot m_1$ Scheme [55] $O(n)$ $(28\cdot n+9)\cdot m_3+(22\cdot n+14)\cdot a$ $28\cdot n\cdot m_3+19\cdot n\cdot a$ Scheme [25] $O(\sqrt{n})$ $(n+9)\cdot e_1+(n+2)\cdot m_1$ $(2\cdot n+3)\cdot e_1+2\cdot n\cdot m_1+9\cdot p$ Scheme [26] $O(n)$ $(5\cdot n-1)e_1+(3\cdot n-2)\cdot m_1$ $5\cdot n\cdot e_1+3\cdot n\cdot m_1$ Scheme [4] $O(1)$ $7\cdot e_1+7\cdot m_1$ $9\cdot e_1+5\cdot m_1+7\cdot e_2+8\cdot m_2+12\cdot p$ Our Scheme $O(1)$ $5\cdot e_1+(n+1)\cdot m_1$ $4\cdot e_1+(n+3)\cdot m_1$
 Signature Size Signing Cost Verification Cost Scheme [40] $O(n)$ $(4\cdot n+3)\cdot e_1+2\cdot n\cdot m_1$ $4\cdot n\cdot e_1+n\cdot m_1$ Scheme [55] $O(n)$ $(28\cdot n+9)\cdot m_3+(22\cdot n+14)\cdot a$ $28\cdot n\cdot m_3+19\cdot n\cdot a$ Scheme [25] $O(\sqrt{n})$ $(n+9)\cdot e_1+(n+2)\cdot m_1$ $(2\cdot n+3)\cdot e_1+2\cdot n\cdot m_1+9\cdot p$ Scheme [26] $O(n)$ $(5\cdot n-1)e_1+(3\cdot n-2)\cdot m_1$ $5\cdot n\cdot e_1+3\cdot n\cdot m_1$ Scheme [4] $O(1)$ $7\cdot e_1+7\cdot m_1$ $9\cdot e_1+5\cdot m_1+7\cdot e_2+8\cdot m_2+12\cdot p$ Our Scheme $O(1)$ $5\cdot e_1+(n+1)\cdot m_1$ $4\cdot e_1+(n+3)\cdot m_1$
Other comparisons of the Six Schemes
 Cryptography Traceability Model Scheme [40] Public Key No random oracle Scheme [55] Public Key No random oracle Scheme [25] Public Key Yes without random oracle Scheme [26] Public Key Yes random oracle Scheme [4] Identity-Based Yes random oracle Our Scheme Public Key Yes random oracle
 Cryptography Traceability Model Scheme [40] Public Key No random oracle Scheme [55] Public Key No random oracle Scheme [25] Public Key Yes without random oracle Scheme [26] Public Key Yes random oracle Scheme [4] Identity-Based Yes random oracle Our Scheme Public Key Yes random oracle
 [1] Palash Sarkar, Subhadip Singha. Verifying solutions to LWE with implications for concrete security. Advances in Mathematics of Communications, 2021, 15 (2) : 257-266. doi: 10.3934/amc.2020057 [2] Jintai Ding, Zheng Zhang, Joshua Deaton. The singularity attack to the multivariate signature scheme HIMQ-3. Advances in Mathematics of Communications, 2021, 15 (1) : 65-72. doi: 10.3934/amc.2020043 [3] Shan Liu, Hui Zhao, Ximin Rong. Time-consistent investment-reinsurance strategy with a defaultable security under ambiguous environment. Journal of Industrial & Management Optimization, 2020  doi: 10.3934/jimo.2021015 [4] Simone Göttlich, Elisa Iacomini, Thomas Jung. Properties of the LWR model with time delay. Networks & Heterogeneous Media, 2020  doi: 10.3934/nhm.2020032 [5] Ténan Yeo. Stochastic and deterministic SIS patch model. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2021012 [6] M. Dambrine, B. Puig, G. Vallet. A mathematical model for marine dinoflagellates blooms. Discrete & Continuous Dynamical Systems - S, 2021, 14 (2) : 615-633. doi: 10.3934/dcdss.2020424 [7] Laurence Cherfils, Stefania Gatti, Alain Miranville, Rémy Guillevin. Analysis of a model for tumor growth and lactate exchanges in a glioma. Discrete & Continuous Dynamical Systems - S, 2020  doi: 10.3934/dcdss.2020457 [8] Laurent Di Menza, Virginie Joanne-Fabre. An age group model for the study of a population of trees. Discrete & Continuous Dynamical Systems - S, 2020  doi: 10.3934/dcdss.2020464 [9] Eduard Feireisl, Elisabetta Rocca, Giulio Schimperna, Arghir Zarnescu. Weak sequential stability for a nonlinear model of nematic electrolytes. Discrete & Continuous Dynamical Systems - S, 2021, 14 (1) : 219-241. doi: 10.3934/dcdss.2020366 [10] Yu Jin, Xiang-Qiang Zhao. The spatial dynamics of a Zebra mussel model in river environments. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2020362 [11] Yunfeng Geng, Xiaoying Wang, Frithjof Lutscher. Coexistence of competing consumers on a single resource in a hybrid model. Discrete & Continuous Dynamical Systems - B, 2021, 26 (1) : 269-297. doi: 10.3934/dcdsb.2020140 [12] Pedro Aceves-Sanchez, Benjamin Aymard, Diane Peurichard, Pol Kennel, Anne Lorsignol, Franck Plouraboué, Louis Casteilla, Pierre Degond. A new model for the emergence of blood capillary networks. Networks & Heterogeneous Media, 2020  doi: 10.3934/nhm.2021001 [13] Mingchao Zhao, You-Wei Wen, Michael Ng, Hongwei Li. A nonlocal low rank model for poisson noise removal. Inverse Problems & Imaging, , () : -. doi: 10.3934/ipi.2021003 [14] Mohamed Dellal, Bachir Bar. Global analysis of a model of competition in the chemostat with internal inhibitor. Discrete & Continuous Dynamical Systems - B, 2021, 26 (2) : 1129-1148. doi: 10.3934/dcdsb.2020156 [15] Jakub Kantner, Michal Beneš. Mathematical model of signal propagation in excitable media. Discrete & Continuous Dynamical Systems - S, 2021, 14 (3) : 935-951. doi: 10.3934/dcdss.2020382 [16] Weiwei Liu, Jinliang Wang, Yuming Chen. Threshold dynamics of a delayed nonlocal reaction-diffusion cholera model. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2020316 [17] Siyang Cai, Yongmei Cai, Xuerong Mao. A stochastic differential equation SIS epidemic model with regime switching. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2020317 [18] Yining Cao, Chuck Jia, Roger Temam, Joseph Tribbia. Mathematical analysis of a cloud resolving model including the ice microphysics. Discrete & Continuous Dynamical Systems - A, 2021, 41 (1) : 131-167. doi: 10.3934/dcds.2020219 [19] Zhouchao Wei, Wei Zhang, Irene Moroz, Nikolay V. Kuznetsov. Codimension one and two bifurcations in Cattaneo-Christov heat flux model. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2020344 [20] Shuang Chen, Jinqiao Duan, Ji Li. Effective reduction of a three-dimensional circadian oscillator model. Discrete & Continuous Dynamical Systems - B, 2020  doi: 10.3934/dcdsb.2020349

2019 Impact Factor: 0.734