Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/118684
PIRA download icon_1.1View/Download Full Text
Title: From Σ-protocol-based signatures to ring signatures : general construction and applications
Authors: Chen, X 
Gao, S 
Xu, S
Chen, L
Yiu, SM
Xiao, B 
Issue Date: 2025
Source: IEEE transactions on information forensics and security, 2025, v. 20, p. 3646-3661
Abstract: Public Key Infrastructure (PKI) has gained widespread attention for ensuring the security and integrity of data communication. While existing PKI mainly supports digital signatures, it is lacking in crucial anonymity, leading to the leakage of a signer’s identity information. To alleviate the issue, ring signatures are a suitable choice to provide anonymity as they allow users to create their own rings without the need for an administrator. Unfortunately, the utilization of ring signatures in PKI may present compatibility challenges within the system. Thus, proposing a general mechanism to convert a standardized Σ -based signature to a ring signature is far-reaching. In this paper, we propose a general construction for converting Σ -based signatures into ring signatures. To achieve this, we first introduce a Σ -based general model, providing a general transformation to convert existing Σ -based signatures into a Σ -protocol form. Subsequently, we incorporate our redesigned one-out-of-many relation within our general model and proceed to devise ring signatures leveraging on one-out-of-many proofs. Furthermore, to reduce the signature size, we employ the Bulletproofs folding technique, enabling the attainment of logarithmic size ring signatures. To demonstrate the wide applicability of our general construction, we present four prominent signatures as case studies. Ultimately, we conduct a rigorous security analysis and benchmark experimental evaluation. The signing and verification times are 0.44 to 0.97 times and 0.27 to 0.91 times compared to other state-of-the-art schemes, respectively. Additionally, we exhibit the lowest signature size to date.
Keywords: General construction
One-out-of-many proofs
Ring signature
Sigma protocol
Publisher: Institute of Electrical and Electronics Engineers
Journal: IEEE transactions on information forensics and security 
ISSN: 1556-6013
EISSN: 1556-6021
DOI: 10.1109/TIFS.2025.3552199
Rights: © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
The following publication X. Chen, S. Gao, S. Xu, L. Chen, S. -M. Yiu and B. Xiao, 'From Σ-Protocol-Based Signatures to Ring Signatures: General Construction and Applications,' in IEEE Transactions on Information Forensics and Security, vol. 20, pp. 3646-3661, 2025 is available at https://doi.org/10.1109/TIFS.2025.3552199.
Appears in Collections:Journal/Magazine Article

Files in This Item:
File Description SizeFormat 
Chen_Σ-protocol-based_Signatures_Ring.pdfPre-Published version5.14 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show full item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.