Table 1: Performance comparison of related schemes.
Scheme Sign Verify Signature size
Liu et al. (Liu et al., 2004) (3+4(N −1))E + (1+2N)M (4N)E + 2NM O(N), N + 2
Fujisaki and Suzuki et al. (Fu-
jisaki and Suzuki, 2007)
(3+2N)E + (2+3N)M (4N)E + (3N)M O(N), 2N + 1
Chandran et al. (Chandran
et al., 2007)
(5+6
√
N+(N+1)/3)E+
(6
√
N+8)M
(6+6
√
N)P + (3
√
N+1)E +
(4
√
N +1)M
O(
√
N),
6
√
N + 6
Liu et al. (Liu et al., 2009) NE N E O(N), 2N + 1
Liu et al. (Liu et al., 2014) (5+N)E+(4+N)M (4+N)E+(3+N)M O(N), N + 3
Yang et al. (Yang et al., 2015) E+NS NS O(N), N + 1
This solution 2E+2M+NS M+NS O(N), N + 2
anonymity, uniqueness, linkability and unforgeabil-
ity, and can be applied in applications with double-
spending and double-voting protection. The solution
does not use heavy operations. The ring signature ver-
ification takes only 1 multiplication and N squaring
which depends on the size of ring (N). Therefore,
the solution could be implemented in services running
in heterogeneous networks with small and medium
groups of constrained devices.
As future work, we would like to make the link
procedure more efficient and integrate the proposed
ring signature scheme into a transaction model based
on blockchain.
ACKNOWLEDGEMENTS
Research described in this paper was financed by the
National Sustainability Program under grant LO1401
and Ministry of Interior under grant VI20162018003.
REFERENCES
Chandran, N., Groth, J., and Sahai, A. (2007). Ring signa-
tures of sub-linear size without random oracles. In In-
ternational Colloquium on Automata, Languages, and
Programming, pages 423–434. Springer.
Conti, M., Lal, C., Ruj, S., et al. (2017). A survey on se-
curity and privacy issues of bitcoin. arXiv preprint
arXiv:1706.00916.
Dodis, Y., Kiayias, A., Nicolosi, A., and Shoup, V. (2004).
Anonymous identification in ad hoc groups. In In-
ternational Conference on the Theory and Applica-
tions of Cryptographic Techniques, pages 609–626.
Springer.
Fujisaki, E. and Suzuki, K. (2007). Traceable ring signature.
In International Workshop on Public Key Cryptogra-
phy, pages 181–200. Springer.
Liu, J. K., Au, M. H., Susilo, W., and Zhou, J. (2009). On-
line/offline ring signature scheme. In International
Conference on Information and Communications Se-
curity, pages 80–90. Springer.
Liu, J. K., Au, M. H., Susilo, W., and Zhou, J. (2014). Link-
able ring signature with unconditional anonymity.
IEEE Transactions on Knowledge and Data Engineer-
ing, 26(1):157–165.
Liu, J. K., Wei, V. K., and Wong, D. S. (2004). Linkable
spontaneous anonymous group signature for ad hoc
groups. In Australasian Conference on Information
Security and Privacy, pages 325–335. Springer.
Noether, S., Mackenzie, A., et al. (2016). Ring confidential
transactions. Ledger, 1:1–18.
Rabin, M. O. (1979). Digitalized signatures and public-
key functions as intractable as factorization. Technical
report, Massachusetts ints. of tech. Cambridge lab for
computer science.
Rivest, R. L., Shamir, A., and Tauman, Y. (2001). How
to leak a secret. In International Conference on the
Theory and Application of Cryptology and Informa-
tion Security, pages 552–565. Springer.
Shacham, H. and Waters, B. (2007). Efficient ring signa-
tures without random oracles. In International Work-
shop on Public Key Cryptography, pages 166–180.
Springer.
Sun, S.-F., Au, M. H., Liu, J. K., and Yuen, T. H. (2017).
Ringct 2.0: A compact accumulator-based (linkable
ring signature) protocol for blockchain cryptocurrency
monero. In European Symposium on Research in
Computer Security, pages 456–474. Springer.
Tsang, P. P. and Wei, V. K. (2005). Short linkable ring sig-
natures for e-voting, e-cash and attestation. In Inter-
national Conference on Information Security Practice
and Experience, pages 48–60. Springer.
Van Saberhagen, N. (2013). Cryptonote v 2. 0.
Wu, Q., Susilo, W., Mu, Y., and Zhang, F. (2006). Ad hoc
group signatures. In International Workshop on Secu-
rity, pages 120–135. Springer.
Yang, X., Wu, W., Liu, J. K., and Chen, X. (2015).
Lightweight anonymous authentication for ad hoc
group: A ring signature approach. In International
Conference on Provable Security, pages 215–226.
Springer.
Zeng, S., Li, Q., Qin, Z., and Lu, Q. (2016). Non-interactive
deniable ring signature without random oracles. Secu-
rity and Communication Networks, 9(12):1810–1819.
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions
531