Traceable ring signature scheme based on domestic cryptographic algorithm SM9
To address the privacy protection issues of digital signature users and prevent the misuse of complete anonymity by malicious users, a traceable ring signature scheme based on the domestic cryptographic algorithm SM9 was proposed. The SM9 algorithm was an identity-based cryptographic algorithm indep...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2025-03-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025041 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849733341078618112 |
|---|---|
| author | XIE Zhenjie YIN Xiaokang CAI Ruijie ZHANG Yao |
| author_facet | XIE Zhenjie YIN Xiaokang CAI Ruijie ZHANG Yao |
| author_sort | XIE Zhenjie |
| collection | DOAJ |
| description | To address the privacy protection issues of digital signature users and prevent the misuse of complete anonymity by malicious users, a traceable ring signature scheme based on the domestic cryptographic algorithm SM9 was proposed. The SM9 algorithm was an identity-based cryptographic algorithm independently developed by China, which was characterized by high security and excellent performance, eliminating the costs associated with public key infrastructure construction and certificate management. By introducing a cryptographic accumulator, the computational costs of ring signature generation and verification, as well as the size of the signature data, were reduced to a constant level. Under the random oracle model, the scheme was proven to achieve EUF-CMIA security based on the <italic>q</italic>-SDH hard problem, and it was demonstrated to have conditional anonymity, enabling the tracing of the actual signer in case of disputes. Theoretical analysis and experimental results show that the signature and verification efficiencies of the proposed scheme are 7.3 times and 3.3 times, respectively, higher than those of existing similar schemes, while the signature data size was approximately one-fifth of theirs. This scheme exhibits significant advantages in both computational efficiency and communication overhead. |
| format | Article |
| id | doaj-art-31232f5bbc2c4a6a8d5537dd2c16c794 |
| institution | DOAJ |
| issn | 1000-436X |
| language | zho |
| publishDate | 2025-03-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-31232f5bbc2c4a6a8d5537dd2c16c7942025-08-20T03:08:05ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2025-03-014619921188698281Traceable ring signature scheme based on domestic cryptographic algorithm SM9XIE ZhenjieYIN XiaokangCAI RuijieZHANG YaoTo address the privacy protection issues of digital signature users and prevent the misuse of complete anonymity by malicious users, a traceable ring signature scheme based on the domestic cryptographic algorithm SM9 was proposed. The SM9 algorithm was an identity-based cryptographic algorithm independently developed by China, which was characterized by high security and excellent performance, eliminating the costs associated with public key infrastructure construction and certificate management. By introducing a cryptographic accumulator, the computational costs of ring signature generation and verification, as well as the size of the signature data, were reduced to a constant level. Under the random oracle model, the scheme was proven to achieve EUF-CMIA security based on the <italic>q</italic>-SDH hard problem, and it was demonstrated to have conditional anonymity, enabling the tracing of the actual signer in case of disputes. Theoretical analysis and experimental results show that the signature and verification efficiencies of the proposed scheme are 7.3 times and 3.3 times, respectively, higher than those of existing similar schemes, while the signature data size was approximately one-fifth of theirs. This scheme exhibits significant advantages in both computational efficiency and communication overhead.http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025041traceable ring signaturedomestic cryptographic algorithmSM9 algorithmcryptographic accumulatoridentity-based cryptography |
| spellingShingle | XIE Zhenjie YIN Xiaokang CAI Ruijie ZHANG Yao Traceable ring signature scheme based on domestic cryptographic algorithm SM9 Tongxin xuebao traceable ring signature domestic cryptographic algorithm SM9 algorithm cryptographic accumulator identity-based cryptography |
| title | Traceable ring signature scheme based on domestic cryptographic algorithm SM9 |
| title_full | Traceable ring signature scheme based on domestic cryptographic algorithm SM9 |
| title_fullStr | Traceable ring signature scheme based on domestic cryptographic algorithm SM9 |
| title_full_unstemmed | Traceable ring signature scheme based on domestic cryptographic algorithm SM9 |
| title_short | Traceable ring signature scheme based on domestic cryptographic algorithm SM9 |
| title_sort | traceable ring signature scheme based on domestic cryptographic algorithm sm9 |
| topic | traceable ring signature domestic cryptographic algorithm SM9 algorithm cryptographic accumulator identity-based cryptography |
| url | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025041 |
| work_keys_str_mv | AT xiezhenjie traceableringsignatureschemebasedondomesticcryptographicalgorithmsm9 AT yinxiaokang traceableringsignatureschemebasedondomesticcryptographicalgorithmsm9 AT cairuijie traceableringsignatureschemebasedondomesticcryptographicalgorithmsm9 AT zhangyao traceableringsignatureschemebasedondomesticcryptographicalgorithmsm9 |