Skip to main content
Log in

A survey of ring signature

  • Review Article
  • Published:
Frontiers of Electrical and Electronic Engineering in China

Abstract

Ring signature allows specifying a set of possible signers without revealing which member actually produces the signature. This concept was first formalized in 2001 by Rivest, Shamir and Tauman. In this paper, we review the state-of-the-art of ring signature, summarize the study of ring signature schemes in the literature and investigate their relationships with other existing cryptographic schemes. We also describe a large number of extensions, modifications and applications of ring signatures after the original version of this work. Some problems in the study of this field were presented as well. Finally, we discuss a number of interesting open problems and point out the possible future work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Rivest R L, Shamir A, Tauman Y. How to leak a secret. Boyd C, ed. In: Proceedings of ASIACRYPT’01. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2001, 2248: 552–565

    Google Scholar 

  2. Chaum D, Heyst V E. Group signatures. Davies D W, ed. In: Proceedings of EUROCRYPT’91. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1991, 547: 257–265

    Google Scholar 

  3. Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. Zheng Y L, ed. In: Proceedings of ASIACRYPT’02. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2002, 2501: 415–432

    Google Scholar 

  4. Zhang F G, Kim K. ID-based blind signature and ring signature from pairings. Zheng Y L, ed. In: Proceedings of ASIACRYPT’02. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2002, 2501: 533–547

    Google Scholar 

  5. Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. Yung M, ed. In: Proceedings of CRYPTO’02. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2002, 2442: 465–480

    Google Scholar 

  6. Naor M. Deniable ring authentication. Yung M, ed. In: Proceedings of CRYPTO’02. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2002, 2442: 481–498

    Google Scholar 

  7. Susilo W, Mu Y. Non-interactive deniable ring authentication. Lim J I, Lee D H, eds. ICISC2003. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 2971: 386–401

    Google Scholar 

  8. Lv J Q, Wang X M. Verifiable ring signature. In: DMS Proceedings of CANS’03, 2003, 663–665

  9. Gao C Z, Yao Z A, Li L. A ring signature scheme based on the Nyberg-Rueppel signature scheme. Zhou J, Yung M, Han Y, eds. In: ACNS 2003. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2003, 2846: 169–175

    Google Scholar 

  10. Herranz J, Sáez G. Forking lemmas for ring signature schemes. Johansson T, Maitra S, eds. In: Proceedings of INDOCRYPT’03. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2003, 2904: 266–279

    Google Scholar 

  11. Zhang F G, Reihaneh S N, Lin C Y. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. http://eprint.iacr.org/2003/104

  12. Chen L Q, Kudla C, Paterson K G. Concurrent signatures. Cachin C, Camenisch J, eds. In: Proceedings of EUROCRYPT’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3027: 287–305

    Google Scholar 

  13. Wong D S, Fung K, Liu J K, et al. On the RS-code construction of ring signature schemes and a threshold setting of RST. Qing S H, Gollmann D, Zhou J Y, eds. In: Proceedings of ICICS 2003. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2003, 2836: 34–46

    Google Scholar 

  14. Liu J K, Wei V K, Wong D S. Linkable spontaneous anonymous group signature for Ad-hoc groups. Wang H X, ed. In: Proceedings of ACISP’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3108: 325–335

    Google Scholar 

  15. Tsang P P, Wei V K, Chan T K, et al. Separable linkable threshold ring signatures. Canteaut A, Viswanathan K, eds. In: Proceedings of INDOCRYPT’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3348: 384–398

    Google Scholar 

  16. Dodis Y, Kiayias A, Nicolosi A, et al. Anonymous identification in Ad-hoc groups. Cachin C, Camenisch J, eds. In: Proceedings of EUROCRYPT’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3027: 609–626

    Google Scholar 

  17. Benaloh J, Mare M D. One-way accumulators: a decentralized alternative to digital signatures. Helleseth T, ed. In: Advances in Cryptology-EUROCRYPT’93. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1993, 765: 274–285

    Google Scholar 

  18. Gan Z, Chen K F. A new verifiable ring signature scheme. Acta Scientlarum Naturalium Universitatis Sunyatseni, 2004, 43(Supp 2): 132–134(in Chinese)

    Google Scholar 

  19. Awasthi A K, Sunder L. ID-based ring signature and proxy ring signature schemes from bilinear pairings. http://eprint.iacr.org/2004/184

  20. Herranz J, Sáez G. New identity-based ring signature schemes. Lopez J, Qing S H, Okamoto E, eds. In: Proceedings of ICICS 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3269: 27–39

    Google Scholar 

  21. Lv J Q, Ren K, Chen X, et al. Ring authenticated encryption: a new type of authenticated encryption. In: Proceedings of SCIS 2004. Sendi: IEICE Press, 2004, 1179–1184

    Google Scholar 

  22. Cao T, Lin D, Xue R. Improved ring authenticated encryption scheme. In: Proceedings of JICC 2004. International Academic Publishers World Publishing Corporation, 2004, 341–346

  23. Wang J L, Zhang J H, Wang Y M. A group signature scheme based on ring signature idea. ACTA Electronic Sinica, 2004, 32(3): 408–410(in Chinese)

    Google Scholar 

  24. Chan T K, Fung K, Liu J K, et al. Blind spontaneous anonymous group signatures for Ad-hoc groups. Castelluccia C, et al. eds. In: Proceedings of ESAS 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3313: 82–94

    Google Scholar 

  25. Chow S S M, Hui L C K, Yiu S M. Identity based threshold ring signature. Park C, Chee S, eds. In: ICISC 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3506: 218–232

    Google Scholar 

  26. Liu J K, Wong D S. On the security models of (threshold) ring signature schemes. Park C, Chee S, eds. In: Proceedings of ICISC 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3506: 204–217

    Google Scholar 

  27. Tsang P P, Wei V K, Chan T K, et al. Separable linkable threshold ring signatures. Canteaut A, Viswanathan K, eds. In: Proceedings of INDOCRYPT’04. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3348: 384–398

    Google Scholar 

  28. Herranz J, Sáez G. Distributed ring signatures for Identity-Based scenarios. http://eprint.iacr.org/2004/190/

  29. Wu Q H, Wang J L, Wang Y M. A t-out-of-n ring signature based on DLP. Advance in ChinaCrypt’04. Beijing: Science Press, 2004, 209–214

    Google Scholar 

  30. Isshiki T, Tanaka K. An (n-t)-out-of-n threshold ring signature scheme. Boyd C, Manuel J, Nieto G, eds. In: Proceedings of ACISP 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3574: 406–416

    Google Scholar 

  31. Au M H, Liu J K, Tsang P P, et al. A suite of ID-based threshold ring signature schemes with different levels of anonymity. http://eprint.iacr.org/2005/326/

  32. Lee K C, Wei H, Hwang T. Convertible ring signature. IEE Proceedings of Communications, 2005, 152(4): 411–414

    Article  Google Scholar 

  33. Tsang P P, Wei V K. Short linkable ring signatures for E-voting, E-cash and attestation. Deng R H, et al, eds. In: Proceedings of ISPEC 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3439: 48–60

    Google Scholar 

  34. Nguyen L. Accumulator from bilinear pairings and application to ID-based ring signatures and group membership revocation. Menezes A, ed. In: Proceedings of CT-RSA 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3376: 275–292

    Google Scholar 

  35. Wu Q H, Zhang F G, Susilo W, et al. An efficient static blind ring signature scheme. Won D, Kim S, eds. In: Proceedings of ICISC 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 3935: 410–423

    Google Scholar 

  36. Lei Q, Jiang Z T, Wang Y M. Ring-based anonymous fingerprinting scheme. Hao Y, Liu J, Wang Y, et al, eds. In: Proceedings of CIS 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3802: 1080–1085

    Google Scholar 

  37. Liu J K, Wong D S. Solutions to Key Exposure problem in ring signature. http://eprint.iacr.org/2005/427/

  38. Zhang F G, Chen X F. Cryptanalysis and improvement of an ID-based Ad-hoc anonymous identification scheme at CT-RSA 05. http://eprint.iacr.org/2005/103/

  39. Chen Y Q, Susilo W, Mu Y. Identity-based anonymous designated ring signatures. Guizani M, Chen H, eds. In: Proceedings of IWCMC’06. USA: ACM Press, 2006, 189–194

    Google Scholar 

  40. Chow S S M, Liu J K, Wei V K, et al. Ring signature without random oracles. http://eprint.iacr.org/2005/317/

  41. Bender A, Katz J, Morselli R. Ring signatures: stronger definitions, and constructions without random oracles. Halevi S, Rabin T, eds. In: Proceedings of TCC 2006. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 3876: 60–79

    Google Scholar 

  42. Huang X Y, Zhang F T, Wu W. An identity-based ring signcryption scheme. ACTA Electronic Sinica, 2006, 34(2), 263–266(in Chinese)

    MathSciNet  Google Scholar 

  43. Susilo W, Mu Y. Deniable ring authentication revisited. Jakobsson M, Yung M, Zhou J, eds. In: Proceedings of ACNS 2004. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 3089: 149–163

    Google Scholar 

  44. Wang C H, Liu C Y. A new ring signature scheme with signer-admission property. Information Sciences, 2007, 177(3): 747–754

    Article  MATH  MathSciNet  Google Scholar 

  45. Au M H, Chow S S M, Susilo W, et al. Short linkable ring signatures revisited. Atzeni A S, Lioy A, eds. In: Proceedings of EuroPKI 2006. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 4043: 101–115

    Google Scholar 

  46. Liu J K, Wei V K, Wong D S. A separable threshold ring signature scheme. Lim J I, Lee D H, eds. In: Proceedings of ICISC 2003. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004, 2971: 12–26

    Google Scholar 

  47. Liu J K, Wong D S. Linkable ring signatures security models and new schemes. Gervasi O, Gavrilova M L, Kumar V, et al. eds. In: Proceedings of ICCSA 2005. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005, 3481: 614–623

    Google Scholar 

  48. Liu J K, Susilo W, Wong D S. Ring signatures with designated linkability. Yoshiura H, Sakurai K, Rannenberg K, et al, eds. In: Proceedings of IWSEC 2006. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 4266: 104–119

    Google Scholar 

  49. Zhang C L, Liu Y, He D Q. A new verifiable ring signature scheme based on Nyberg-Rueppel scheme. In: Proceedings of ICSP2006. USA: IEEE Press, 2006

    Google Scholar 

  50. Fujisaki E, Suzuki K. Traceable ring signature. http://eprint.iacr.org/2006/389

  51. Lang W M, Yang Z K, Cheng W Q, et al. An improved identity-based proxy ring signature scheme. High Technology Letters, 2005, 11(1): 17–19

    Google Scholar 

  52. Li J, Chen X F, Yuen T H, et al. Proxy ring signature: formal definitions, efficient construction and new variant. In: Proceedings of CIS 2006. USA: IEEE Press, 2006, 1259–1264

    Google Scholar 

  53. Herranz J, Laguillaumie F. Blind ring signatures secure under the Chosen-Target-CDH assumption. Katsikas S K, et al, eds. In: Proceedings of ISC 2006. Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2006, 4176: 117–130

    Google Scholar 

  54. Cao T J, Lin D D, Xue R. ID-based ring authenticated encryption. In: Proceedings of AINA’05. USA: IEEE Press, 2005, 591–596

    Google Scholar 

  55. Ma C G, Yang Y X. Transferable off-line electronic cash. Chinese Journal of Computers, 2005, 28(3): 301–308 (in Chinese)

    Google Scholar 

  56. Ma C G, Yang Y X, Hu Z M, et al. A fair electronic check systems with reusable refund. ACTA Electronic Sinica, 2005, 33(9): 1562–1566 (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lingling Wang.

Additional information

__________

Translated from Journal on Communications, 2007, 28(5): 109–117 [译自: 通信学报]

About this article

Cite this article

Wang, L., Zhang, G. & Ma, C. A survey of ring signature. Front. Electr. Electron. Eng. China 3, 10–19 (2008). https://doi.org/10.1007/s11460-008-0012-8

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11460-008-0012-8

Keywords

Navigation