CISPA
Browse
- No file added yet -

Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions

Download (431.86 kB)
conference contribution
posted on 2023-11-29, 18:10 authored by Michael BackesMichael Backes, Nico DöttlingNico Döttling, Lucjan HanzlikLucjan Hanzlik, Kamil Kluczniak, Janine SchneiderJanine Schneider
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the true identity of the signer among the group. A natural goal is to construct a ring signature scheme for which the signature size is short in the number of ring members. Moreover, such a construction should not rely on a trusted setup and be proven secure under falsifiable standard assumptions. Despite many years of research this question is still open. In this paper, we present the first construction of logarithmic-size ring signatures which do not rely on a trusted setup or the random oracle heuristic. Specifically, our scheme can be instantiated from standard assumptions and the size of signatures grows only logarithmically in the number of ring members. We also extend our techniques to the setting of linkable ring signatures, where signatures created using the same signing key can be linked.

History

Preferred Citation

Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak and Jonas Schneider. Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions. In: International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). 2019.

Primary Research Area

  • Algorithmic Foundations and Cryptography

Name of Conference

International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)

Legacy Posted Date

2019-04-18

Open Access Type

  • Unknown

BibTeX

@inproceedings{cispa_all_2877, title = "Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions", author = "Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas", booktitle="{International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT)}", year="2019", }

Usage metrics

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC