Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/118684
| Title: | From Σ-protocol-based signatures to ring signatures : general construction and applications | Authors: | Chen, X Gao, S Xu, S Chen, L Yiu, SM Xiao, B |
Issue Date: | 2025 | Source: | IEEE transactions on information forensics and security, 2025, v. 20, p. 3646-3661 | Abstract: | Public Key Infrastructure (PKI) has gained widespread attention for ensuring the security and integrity of data communication. While existing PKI mainly supports digital signatures, it is lacking in crucial anonymity, leading to the leakage of a signer’s identity information. To alleviate the issue, ring signatures are a suitable choice to provide anonymity as they allow users to create their own rings without the need for an administrator. Unfortunately, the utilization of ring signatures in PKI may present compatibility challenges within the system. Thus, proposing a general mechanism to convert a standardized Σ -based signature to a ring signature is far-reaching. In this paper, we propose a general construction for converting Σ -based signatures into ring signatures. To achieve this, we first introduce a Σ -based general model, providing a general transformation to convert existing Σ -based signatures into a Σ -protocol form. Subsequently, we incorporate our redesigned one-out-of-many relation within our general model and proceed to devise ring signatures leveraging on one-out-of-many proofs. Furthermore, to reduce the signature size, we employ the Bulletproofs folding technique, enabling the attainment of logarithmic size ring signatures. To demonstrate the wide applicability of our general construction, we present four prominent signatures as case studies. Ultimately, we conduct a rigorous security analysis and benchmark experimental evaluation. The signing and verification times are 0.44 to 0.97 times and 0.27 to 0.91 times compared to other state-of-the-art schemes, respectively. Additionally, we exhibit the lowest signature size to date. | Keywords: | General construction One-out-of-many proofs Ring signature Sigma protocol |
Publisher: | Institute of Electrical and Electronics Engineers | Journal: | IEEE transactions on information forensics and security | ISSN: | 1556-6013 | EISSN: | 1556-6021 | DOI: | 10.1109/TIFS.2025.3552199 | Rights: | © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The following publication X. Chen, S. Gao, S. Xu, L. Chen, S. -M. Yiu and B. Xiao, 'From Σ-Protocol-Based Signatures to Ring Signatures: General Construction and Applications,' in IEEE Transactions on Information Forensics and Security, vol. 20, pp. 3646-3661, 2025 is available at https://doi.org/10.1109/TIFS.2025.3552199. |
| Appears in Collections: | Journal/Magazine Article |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Chen_Σ-protocol-based_Signatures_Ring.pdf | Pre-Published version | 5.14 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



