Ring signature

2Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter, we discuss the basics of ring signature-a kind of anonymous signature that allows a user to sign on behalf of a self-formed group such that the verifier only knows that the signer is one of the users of this group but cannot find out the identification information (such as public key) of the real signer. We give the security model and a simple construction based on discrete logarithm setting. Then, we cover a variant called linkable ring signature, which provides linkability in addition to the property of a normal ring signature. Finally, we present a commercial application of (linkable) ring signature in blockchain called Ring Confidential Transaction (RingCT), which is the privacy-preserving protocol used in Monero, one of the largest cryptocurrencies in the world.

Cite

CITATION STYLE

APA

Liu, J. K. (2018). Ring signature. In Advances in Cyber Security: Principles, Techniques, and Applications (pp. 93–114). Springer Singapore. https://doi.org/10.1007/978-981-13-1483-4_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free