Abstract
Ring signature allows specifying a set of possible signers without revealing which member actually produces the signature. This concept was first formalized in 2001 by Rivest, Shamir and Tauman. In this paper, we review the state-of-the-art of ring signature, summarize the study of ring signature schemes in the literature and investigate their relationships with other existing cryptographic schemes. We also describe a large number of extensions, modifications and applications of ring signatures after the original version of this work. Some problems in the study of this field were presented as well. Finally, we discuss a number of interesting open problems and point out the possible future work.
Similar content being viewed by others
References
Rivest R L, Shamir A, Tauman Y. How to leak a secret. Boyd C, ed. In: Proceedings of ASIACRYPT’01. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2001, 2248: 552–565
Chaum D, Heyst V E. Group signatures. Davies D W, ed. In: Proceedings of EUROCRYPT’91. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1991, 547: 257–265
Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. Zheng Y L, ed. In: Proceedings of ASIACRYPT’02. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2002, 2501: 415–432
Zhang F G, Kim K. ID-based blind signature and ring signature from pairings. Zheng Y L, ed. In: Proceedings of ASIACRYPT’02. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2002, 2501: 533–547
Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. Yung M, ed. In: Proceedings of CRYPTO’02. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2002, 2442: 465–480
Naor M. Deniable ring authentication. Yung M, ed. In: Proceedings of CRYPTO’02. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2002, 2442: 481–498
Susilo W, Mu Y. Non-interactive deniable ring authentication. Lim J I, Lee D H, eds. ICISC2003. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 2971: 386–401
Lv J Q, Wang X M. Verifiable ring signature. In: DMS Proceedings of CANS’03, 2003, 663–665
Gao C Z, Yao Z A, Li L. A ring signature scheme based on the Nyberg-Rueppel signature scheme. Zhou J, Yung M, Han Y, eds. In: ACNS 2003. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2003, 2846: 169–175
Herranz J, Sáez G. Forking lemmas for ring signature schemes. Johansson T, Maitra S, eds. In: Proceedings of INDOCRYPT’03. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2003, 2904: 266–279
Zhang F G, Reihaneh S N, Lin C Y. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. http://eprint.iacr.org/2003/104
Chen L Q, Kudla C, Paterson K G. Concurrent signatures. Cachin C, Camenisch J, eds. In: Proceedings of EUROCRYPT’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3027: 287–305
Wong D S, Fung K, Liu J K, et al. On the RS-code construction of ring signature schemes and a threshold setting of RST. Qing S H, Gollmann D, Zhou J Y, eds. In: Proceedings of ICICS 2003. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2003, 2836: 34–46
Liu J K, Wei V K, Wong D S. Linkable spontaneous anonymous group signature for Ad-hoc groups. Wang H X, ed. In: Proceedings of ACISP’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3108: 325–335
Tsang P P, Wei V K, Chan T K, et al. Separable linkable threshold ring signatures. Canteaut A, Viswanathan K, eds. In: Proceedings of INDOCRYPT’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3348: 384–398
Dodis Y, Kiayias A, Nicolosi A, et al. Anonymous identification in Ad-hoc groups. Cachin C, Camenisch J, eds. In: Proceedings of EUROCRYPT’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3027: 609–626
Benaloh J, Mare M D. One-way accumulators: a decentralized alternative to digital signatures. Helleseth T, ed. In: Advances in Cryptology-EUROCRYPT’93. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1993, 765: 274–285
Gan Z, Chen K F. A new verifiable ring signature scheme. Acta Scientlarum Naturalium Universitatis Sunyatseni, 2004, 43(Supp 2): 132–134(in Chinese)
Awasthi A K, Sunder L. ID-based ring signature and proxy ring signature schemes from bilinear pairings. http://eprint.iacr.org/2004/184
Herranz J, Sáez G. New identity-based ring signature schemes. Lopez J, Qing S H, Okamoto E, eds. In: Proceedings of ICICS 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3269: 27–39
Lv J Q, Ren K, Chen X, et al. Ring authenticated encryption: a new type of authenticated encryption. In: Proceedings of SCIS 2004. Sendi: IEICE Press, 2004, 1179–1184
Cao T, Lin D, Xue R. Improved ring authenticated encryption scheme. In: Proceedings of JICC 2004. International Academic Publishers World Publishing Corporation, 2004, 341–346
Wang J L, Zhang J H, Wang Y M. A group signature scheme based on ring signature idea. ACTA Electronic Sinica, 2004, 32(3): 408–410(in Chinese)
Chan T K, Fung K, Liu J K, et al. Blind spontaneous anonymous group signatures for Ad-hoc groups. Castelluccia C, et al. eds. In: Proceedings of ESAS 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3313: 82–94
Chow S S M, Hui L C K, Yiu S M. Identity based threshold ring signature. Park C, Chee S, eds. In: ICISC 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3506: 218–232
Liu J K, Wong D S. On the security models of (threshold) ring signature schemes. Park C, Chee S, eds. In: Proceedings of ICISC 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3506: 204–217
Tsang P P, Wei V K, Chan T K, et al. Separable linkable threshold ring signatures. Canteaut A, Viswanathan K, eds. In: Proceedings of INDOCRYPT’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3348: 384–398
Herranz J, Sáez G. Distributed ring signatures for Identity-Based scenarios. http://eprint.iacr.org/2004/190/
Wu Q H, Wang J L, Wang Y M. A t-out-of-n ring signature based on DLP. Advance in ChinaCrypt’04. Beijing: Science Press, 2004, 209–214
Isshiki T, Tanaka K. An (n-t)-out-of-n threshold ring signature scheme. Boyd C, Manuel J, Nieto G, eds. In: Proceedings of ACISP 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3574: 406–416
Au M H, Liu J K, Tsang P P, et al. A suite of ID-based threshold ring signature schemes with different levels of anonymity. http://eprint.iacr.org/2005/326/
Lee K C, Wei H, Hwang T. Convertible ring signature. IEE Proceedings of Communications, 2005, 152(4): 411–414
Tsang P P, Wei V K. Short linkable ring signatures for E-voting, E-cash and attestation. Deng R H, et al, eds. In: Proceedings of ISPEC 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3439: 48–60
Nguyen L. Accumulator from bilinear pairings and application to ID-based ring signatures and group membership revocation. Menezes A, ed. In: Proceedings of CT-RSA 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3376: 275–292
Wu Q H, Zhang F G, Susilo W, et al. An efficient static blind ring signature scheme. Won D, Kim S, eds. In: Proceedings of ICISC 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 3935: 410–423
Lei Q, Jiang Z T, Wang Y M. Ring-based anonymous fingerprinting scheme. Hao Y, Liu J, Wang Y, et al, eds. In: Proceedings of CIS 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3802: 1080–1085
Liu J K, Wong D S. Solutions to Key Exposure problem in ring signature. http://eprint.iacr.org/2005/427/
Zhang F G, Chen X F. Cryptanalysis and improvement of an ID-based Ad-hoc anonymous identification scheme at CT-RSA 05. http://eprint.iacr.org/2005/103/
Chen Y Q, Susilo W, Mu Y. Identity-based anonymous designated ring signatures. Guizani M, Chen H, eds. In: Proceedings of IWCMC’06. USA: ACM Press, 2006, 189–194
Chow S S M, Liu J K, Wei V K, et al. Ring signature without random oracles. http://eprint.iacr.org/2005/317/
Bender A, Katz J, Morselli R. Ring signatures: stronger definitions, and constructions without random oracles. Halevi S, Rabin T, eds. In: Proceedings of TCC 2006. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 3876: 60–79
Huang X Y, Zhang F T, Wu W. An identity-based ring signcryption scheme. ACTA Electronic Sinica, 2006, 34(2), 263–266(in Chinese)
Susilo W, Mu Y. Deniable ring authentication revisited. Jakobsson M, Yung M, Zhou J, eds. In: Proceedings of ACNS 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3089: 149–163
Wang C H, Liu C Y. A new ring signature scheme with signer-admission property. Information Sciences, 2007, 177(3): 747–754
Au M H, Chow S S M, Susilo W, et al. Short linkable ring signatures revisited. Atzeni A S, Lioy A, eds. In: Proceedings of EuroPKI 2006. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 4043: 101–115
Liu J K, Wei V K, Wong D S. A separable threshold ring signature scheme. Lim J I, Lee D H, eds. In: Proceedings of ICISC 2003. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 2971: 12–26
Liu J K, Wong D S. Linkable ring signatures security models and new schemes. Gervasi O, Gavrilova M L, Kumar V, et al. eds. In: Proceedings of ICCSA 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3481: 614–623
Liu J K, Susilo W, Wong D S. Ring signatures with designated linkability. Yoshiura H, Sakurai K, Rannenberg K, et al, eds. In: Proceedings of IWSEC 2006. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 4266: 104–119
Zhang C L, Liu Y, He D Q. A new verifiable ring signature scheme based on Nyberg-Rueppel scheme. In: Proceedings of ICSP2006. USA: IEEE Press, 2006
Fujisaki E, Suzuki K. Traceable ring signature. http://eprint.iacr.org/2006/389
Lang W M, Yang Z K, Cheng W Q, et al. An improved identity-based proxy ring signature scheme. High Technology Letters, 2005, 11(1): 17–19
Li J, Chen X F, Yuen T H, et al. Proxy ring signature: formal definitions, efficient construction and new variant. In: Proceedings of CIS 2006. USA: IEEE Press, 2006, 1259–1264
Herranz J, Laguillaumie F. Blind ring signatures secure under the Chosen-Target-CDH assumption. Katsikas S K, et al, eds. In: Proceedings of ISC 2006. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 4176: 117–130
Cao T J, Lin D D, Xue R. ID-based ring authenticated encryption. In: Proceedings of AINA’05. USA: IEEE Press, 2005, 591–596
Ma C G, Yang Y X. Transferable off-line electronic cash. Chinese Journal of Computers, 2005, 28(3): 301–308 (in Chinese)
Ma C G, Yang Y X, Hu Z M, et al. A fair electronic check systems with reusable refund. ACTA Electronic Sinica, 2005, 33(9): 1562–1566 (in Chinese)
Author information
Authors and Affiliations
Corresponding author
Additional information
__________
Translated from Journal on Communications, 2007, 28(5): 109–117 [译自: 通信学报]
About this article
Cite this article
Wang, L., Zhang, G. & Ma, C. A survey of ring signature. Front. Electr. Electron. Eng. China 3, 10–19 (2008). https://doi.org/10.1007/s11460-008-0012-8
Issue Date:
DOI: https://doi.org/10.1007/s11460-008-0012-8