A Code-Based Linkable Ring Signature Scheme
A Code-Based Linkable Ring Signature Scheme
A Code-Based Linkable Ring Signature Scheme
Scheme
1 Introduction
With the advent of the quantum computer, most of the standard asymmetric
cryptography is threatened since Shor’s algorithm is able to solve both dis-
crete logarithm and factorization problems [28]. As a consequence of this fact,
the development of post-quantum cryptographic primitives is crucial for the
future. Among the most important cryptographic primitives are digital signa-
ture schemes. They have the same legal value of a physical signature and can be
used in a wide range of applications such as authentication for a secure access to
a website, non-repudiation of contracts, validating transactions (as in the Bitcoin
system and other cryptocurrencies system) or e-voting. However, post-quantum
(in particular, code-based) digital signature schemes are still very inefficient for
applications and there are a lot of signature types for which there is no code-
based variant.
Linkable ring signature schemes [24] are a special type of ring signature
schemes that allow linkability, i.e., that allow two different signatures to be
linked to the same signer in a ring. Their applications to e-voting, e-cash and
cryptocurrencies are well known [27,31]. But, until now, there was no construc-
tion of this primitive based on coding theory.
In this work, we present the first linkable ring signature scheme whose security
is based on a hard problem in coding theory, the syndrome decoding problem.
c Springer Nature Switzerland AG 2018
J. Baek et al. (Eds.): ProvSec 2018, LNCS 11192, pp. 203–219, 2018.
https://doi.org/10.1007/978-3-030-01446-9_12
204 P. Branco and P. Mateus
Until this moment, most of the linkable ring signature schemes had their security
based on the discrete logarithm problem, which makes them useless for the post-
quantum era. Since our construction is based on a well-known code-based hard
problem, it is conjecture to be robust against quantum attacks and thus, suitable
for the post-quantum world.
Ring Signatures. Ring signature schemes are a special type of digital signa-
ture [26]. They allow for a user in a group to sign a message in name of the
group while preserving its anonymity. They can be seen as a particular case of
group signature scheme [13], where a member of a group can sign messages in
name of the group such that a verifier cannot know who signed the message but
the anonymity can be revoked by a group manager.
In some applications, one may be interested in knowing if two ring signatures
were issued by the same user in the ring. This can be done trivially using a group
signature scheme. The problem is that, in group signature schemes, anonymity
only exists as long as the group manager wants. Sometimes we may wish to
preserve the anonymity of a signer in a ring and give the verifier the chance to
know if two signatures were issued by the same user. This is the motivation for
creating linkable ring signature schemes.
Linkable Ring Signatures. Linkable ring signatures [24] are ring signature
schemes where it is possible to determine when two different messages were
signed by the same group user. They have important applications in e-cash and
e-voting [31]. At the moment, most of the existing signature schemes are based
on the discrete logarithm problem [7,23–25,31,32]. Therefore their security is
threatened: Shor’s algorithm [28] solves the discrete logarithm problem and,
thus, it breaks all of these linkable ring signature schemes. Very recently two dif-
ferent lattice-based linkable ring signature schemes were presented [8,30], which
are conjectured to be secure against quantum adversaries.
Code-Based Signatures. The first signature scheme based on coding theory
appeared in 2001 [14] and, in the last years, there was a huge development
of post-quantum signatures and, in particular, of code-based signature schemes.
The first code-based ring signature scheme appeared in 2007 [34]. After that,
many other variants were proposed like threshold ring signatures schemes [3,16],
undeniable signature schemes [2] or group signature schemes [4,5,18]. But, as
far as the authors know, this is the first proposal for a linkable ring signatures
scheme based on coding theory.
The signature schemes of [14,34] use trapdoors and, for this reason, their
security is based on both the Syndrome Decoding problem and on the Goppa
Distinguisher problem [14]. The latter can be solved when Goppa codes are used
with high rates [19] and hence, we have to increase their security parameters,
making them impractical in real-life applications. To overcome this problem, we
use the Fiat-Shamir transform (following [3,16]) to obtain linkable ring signature
scheme with more practical key sizes.
A Code-Based Linkable Ring Signature Scheme 205
In this paper, we give the first construction of a linkable ring signature scheme
whose security is based on a hard problem in coding theory. We also give a
variant of the proposed linkable ring signature scheme that provides the usual
security properties of existential unforgeability, anonymity and linkability.
To construct our proposal, we use a variant of Stern’s protocol and then we
apply the Fiat-Shamir transform to it. Signatures can be linked to each other
by a vector r that is the syndrome of the secret key of the signer by a random
matrix H.
In this section, we give the definition of a linkable ring signature scheme and
present the security model we adopt. By linked signatures we mean that they
were signed by the same user in the ring.
Definition 1. A linkable ring signature scheme is a tuple of algorithms
(KeyGen, Sign, Ver, Link) where:
The security model we adopt is based on [7,25]. In order for a linkable ring
signature scheme to be secure, it must be existential unforgeable, anonymous,
non-slanderable and linkable. Existential unforgeability prevents an adversary
from forging a signature in name of a group if it does not have a public key
in this group, for any message M , while anonymity certifies that an adversary
is incapable of knowing who inside the group has signed a given message. Non-
slanderability (firstly introduced in [31] and formalized in [7]) prevents an adver-
sary from creating a signature that is linked to a second signature issued by other
user. Linkability guarantees that a user cannot create two valid signatures that
are not linked.
In the following, let pk = {pk1 , . . . , pkN } be the set of public keys of the users
in the ring and L ⊆ pk. Sign(·, sk) is a signing oracle that receives queries of
the form (pk, M ), and outputs σ ← Sign(1κ , pk, M, ski ), for any i ∈ {1, . . . , N },
and Co(·) be a corruption oracle that receives queries of the for pk and outputs
the corresponding secret key sk.
Existential Unforgeability. Consider the following game:
A (κ, N ) :
Gameunf
1 : (pki , ski ) ← KeyGen(1κ ) i = 1, . . . , N
Sign(·,ski ),Co(·)
2 : (L, M, σ) ← A (pk)
κ
3 : b ← Ver (1 , L, M, σ)
4 : return b
where (L, M ) was not asked Sign(·, sk) and A only queried Co(·) for pk ∈
/ L. We
define
A (κ, N ) := Pr[b = 1] .
Advunf
If for all PPT adversaries A we have that Advunf A (κ, N ) ≤ negl(κ, N ) then the
linkable ring signature scheme is existentially unforgeable. This is called unforge-
ability with respect to insider corruption in [9] and it is the strongest level of
unforgeability that a ring signature can achieve.
A Code-Based Linkable Ring Signature Scheme 207
Gameanon
A (κ, N ) :
1 : (pki , ski ) ← KeyGen(1κ ) i = 0, 1
2 : b ←$ {0, 1}
3 : b ← ASign(·,skb ),Sign(·,sk0 ),Sign(·,sk1 ) (pk0 , pk1 )
4 : return b
where the adversary is not allowed to ask queries with different L to Sign(·, skb )
nor to ask queries with the same L to both Sign(·, skb ) and Sign(·, sk0 ) or to both
Sign(·, skb ) and Sign(·, sk1 ). We do not allow this to happen to avoid the trivial
attacks. We define
1
Advanon
A (κ, N ) := Pr [b = b ] − .
2
If for all PPT adversaries A we have Advanon A (κ, N ) ≤ negl(κ, N ) then the link-
able ring signature scheme is anonymous. This definition is equivalent to the
definition of anonymity with respect to adversarially-chosen keys in [9], as it is
stated in [21].
Non-slanderability. Consider the following game:
A (κ, N ) :
Gamensla
1 : (pki , ski ) ← KeyGen(1κ ), i = 1, . . . N
Sign(·,ski )
2 : (L, pk1 , M1 ) ← A (pk)
κ
3 : σ1 ← Sign(1 , L, M1 , sk1 )
4 : (pk2 , M2 , σ2 ) ← ASign(·,ski ) (pk, L, sk2 , pk1 , M1 , σ1 )
5 : b ← Link(1κ , L, M1 , σ1 , M2 , σ2 )
6 : return b
where pk1 , pk2 ∈ L, pk1 = pk2 and both pairs (L, M1 ), σ1 and (L, M2 ), σ2 were
not asked to nor replied by Sign(·, ski ). We define
A (κ, N ) := Pr[b = 1] .
Advnsl
A (κ, N ) :
Gamelink
1 : (pki , ski ) ← KeyGen(1κ ), i = 1, . . . , N
Sign(·,ski )
2 : pk ← A (pk)
3 : (L, M1 , σ1 , M2 , σ2 ) ← ASign(·,ski ) (pk, pk)
4 : b ← 1 − Link(1κ , L, M1 , σ1 , M2 , σ2 )
5 : return b
208 P. Branco and P. Mateus
A (κ, L) := Pr[b = 1] .
Advlink
Due to the lack of space, we review very briefly some basic concepts on sigma
protocols and on the Fiat-Shamir transform. For a more detailed review, see [17].
A sigma protocol (P, V) is a three-round protocol between a prover P and a
verifier V where the prover tries to convince the verifier about the validity of
some statement. A proof of knowledge (PoK) is a particular case of a sigma
protocol. Here, the prover P convinces the verifier V, not only about the veracity
of the statement but also that P has a witness for it. The three rounds of any
sigma protocol are the commitment (com) by the prover, the challenge (ch) by
the verifier and the response (resp) by the prover. A transcript (com, ch, resp)
is said to be valid if the verifier accepts it as a valid proof.
A sigma protocol must have the following properties: (i) completeness, which
guarantees that the verifier will accept the proof with high probability if the
prover has the secret; (ii) special soundness, which ensures that there is an extrac-
tor such that, given two valid transcripts (com, ch, resp) and (com, ch , resp )
where ch = ch , then it can extract the secret; and (iii) honest-verifier zero-
knowledge (HVZK) which ensures that no information is gained by the verifier
by just looking at the proof. This is usually proven by showing the existence of a
simulator that can generate transcripts that are computationally indistinguish-
able from transcripts generated by the interaction between the prover and the
verifier.
As usual, we denote a relation of size n in X × W by Rn . Given x ∈ X
(which is public information) and w ∈ W (usually called the witness), it can
be computed whether Rn (x, w) = 1. We define the set LR = {x ∈ X : ∃w ∈
W s.t. Rn (x, w) = 1}.
The following definitions are taken from [33] and they will be useful to argue
post-quantum security of the Fiat-Shamir transform.
A sigma protocol (P, V) is said to be statistically sound if
Pr 1 ← V ∧ x ∈ / LRn | (x, com) ← A1 , ch ←$ {0, 1}l , resp ← A2 ≤ negl(n) ,
where A2 takes (ch) as input and V takes the transcript (com, ch, resp). The
sigma protocol (P, V) is said to have unpredictable commitments if for all (x, w)
such that Rn (x, w) = 1 we have that
Proof. The proof is similar to the proofs of completeness, special soundness and
HVZK for Stern’s protocol, presented in [29].
N
Algorithm 2. 1 -GStern’s protocol
1. Public information: H, G ∈ {0, 1}n×n−k , s1 , . . . , sN , r1 , . . . , rN ∈ {0, 1}n−k
and t ∈ Z.
2. Secret information: e ∈ {0, 1}n such that w(e) = t, HeT = sTi and GeT = rTi
for some i.
3. Prover’s commitment:
– P ∗ simulates transcripts (com j , ch j , resp j ) using the simulator S for GStern’s
protocol for j = i;
– P ∗ computes com i according to GStern’s protocol;
– P ∗ sends com 1 , . . . , com n ;
4. Verifier’s challenge: V sends b ←$ C.
5. Prover’s answer:
– P computes ch i = b + j=i ch j ;
– P chooses resp i , according to com i and ch i ;
– Sends (com j , ch j , resp j ) for every j;
6. Verifier’s verification:
– V checks that (com j , ch j , resp j ) is valid for every j according to GStern’s pro-
tocol;
– V checks that b = j ch j ;
– If all the previous conditions hold, V accepts.
be able to know the committer’s commitment before the opening phase; and it
should be binding, meaning that the committer should not be able to open a
different message from the one she has committed before. By a perfectly bind-
ing commitment scheme (PBCS) we mean a commitment scheme for which the
user that commits cannot change its commitment even if it has unlimited com-
putational power. In this work, we use a post-quantum PBCS as a black-box,
although it is known that PBCS exist in the post-quantum setting (see, for
instance [22], that is proven to be secure under the LPN problem, the dual and
equivalent version of the SD problem). In our construction, any commitment
scheme can be used as long as it is perfectly binding and computationally hiding
against quantum attacks.
As we show in the next result, to construct a variant of GStern’s protocol that
achieves statistical soundness, it is enough to replace the hash function h used
to create the commitments, in the Prover’s commitment phase, by a perfectly
binding commitment scheme. We will call it the PQ GStern’s protocol. Observe
that this is still a complete and HVZK protocol.
Lemma 2. PQ GStern’s protocol is statistically sound.
Proof. First, note that, if Com is a PBCS, then Com(x1 ) = Com(x2 ) for x1 = x2
except with negligible probability. If this happens with non-negligible probability,
then the user who is committing could send Com(x1 ) and then reveal x2 with
non-negligible probability, contradicting the fact that Com is perfectly binding.
Suppose that there is an algorithm A (not necessarily running in polynomial-
time) that breaks the statistical soundness of PQ Stern’s protocol. Then A is
A Code-Based Linkable Ring Signature Scheme 213
able to find H, s, G, r and t, for which there is no e such that w(e) = t, HeT = s
and GeT = rT , and com such that it is able to answer correctly to any challenge
with non-negligible probability. This implies that either A is able to break the
special soundness of the protocol (note that, since there is no witness for the
instance (H, s.G, r, t) then the adversary must build its commitments according
to some strategy since, if it follows the protocol, it will be caught) or it is able
to break the PBCS. The first event happens with probability as close to zero as
we want and the second event also happens with negligible probability. In both
cases, we reach a contradiction.
Proof. Again, recall that Com(x1 ) = Com(x2 ) for x1 = x2 except with negligible
probability, when Com is a PBCS.
Now consider GStern’s protocol. For two commitments made in different
executions of the protocol to be equal, the prover would have to choose uniformly
at random two vectors y and z of length n and two permutations δ and γ over
1, . . . , n such that
1. (δ, HyT , GyT ) = (γ, HzT , GzT )
2. δ(y) = γ(z)
3. δ(y + e) = γ(z + e).
By 1. we conclude that δ = γ in order for the commitments to be equal. But
the probability of this happening is 1/n!. This is enough to prove the lemma,
since we have that
N
To finish this section, note that the same technique can be applied to 1 -
GStern’s protocol in order toobtain
new a sigma protocol that yield statistical
soundness. It is obvious that N1 -GStern’s protocol also has unpredictable com-
mitments. We will call PQ N1 -GStern’s protocol to this new version.
Anonymity. In order to prove anonymity for the linkable ring signature scheme,
we reduce the GSD problem to that of breaking anonymity. In this proof, we
assume that we are able to break the anonymity of the scheme, and construct
an algorithm that solves the GSD problem. However, we have to know before-
hand some non-null coordinates of the error vector, namely we assume that t/2
positions are known. This is required because we know how the algorithm that
breaks the anonymity behaves when it is given two valid public key or when
it is given two random values as public keys. However, we do not know how it
behaves when it is given one valid public key and one random value as public
key. Moreover, given a tuple (H, s, G, r, t), we do not know if this represents a
valid public key of the cryptosystem or if it is a random tuple. However, if we
know part of the secret, we are able to construct another tuple (H, s , G, r , t)
that is a GSD tuple if (H, s, G, r, t) is a GSD tuple or that is a random tuple if
(H, s, G, r, t) is a random tuple. The fact that t/2 positions are known does not
threat the security proof since the GSD problem is still computationally hard.
We just have to increase the parameters to maintain the same level of security.
Theorem 4. Assume that the GSD problem knowing t/2 positions of the error
vector is hard. The proposed linkable ring signature scheme has anonymity in
the ROM.
Linkability. Linkability prevents a user from signing two messages that are not
linked. To show that the proposed linkable ring signature scheme has linkability,
we must prove that it is infeasible for an adversary with access to at most one
secret key to create signatures that are not linked.
Theorem 6. Assume that the GSD problem is hard. The linkable ring signature
scheme is linkable in the ROM.
216 P. Branco and P. Mateus
References
1. Abdalla, M., An, J.H., Bellare, M., Namprempre, C.: From identification to sig-
natures via the fiat-shamir transform: minimizing assumptions for security and
forward-security. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332,
pp. 418–433. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-
7 28
2. Aguilar-Melchor, C., Bettaieb, S., Gaborit, P., Schrek, J.: A code-based undeniable
signature scheme. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 99–119.
Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45239-0 7
3. Aguilar Melchor, C., Cayrel, P.L., Gaborit, P., Laguillaumie, F.: A new efficient
threshold ring signature scheme based on coding theory. IEEE Trans. Inf. Theor.
57(7), 4833–4842 (2011)
4. Alamélou, Q., Blazy, O., Cauchie, S., Gaborit, P.: A practical group signature
scheme based on rank metric. In: Duquesne, S., Petkova-Nikova, S. (eds.) WAIFI
2016. LNCS, vol. 10064, pp. 258–275. Springer, Cham (2016). https://doi.org/10.
1007/978-3-319-55227-9 18
5. Alamélou, Q., Blazy, O., Cauchie, S., Gaborit, P.: A code-based group signature
scheme. Des. Codes Crypt. 82(1), 469–493 (2017). https://doi.org/10.1007/s10623-
016-0276-6
6. Ambainis, A., Rosmanis, A., Unruh, D.: Quantum attacks on classical proof sys-
tems: the hardness of quantum rewinding. In: Proceedings of the 2014 IEEE 55th
Annual Symposium on Foundations of Computer Science, FOCS 2014, pp. 474–483.
IEEE Computer Society, Washington (2014). http://dx.doi.org/10.1109/FOCS.
2014.57
218 P. Branco and P. Mateus
7. Au, M.H., Chow, S.S.M., Susilo, W., Tsang, P.P.: Short linkable ring signatures
revisited. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp.
101–115. Springer, Heidelberg (2006). https://doi.org/10.1007/11774716 9
8. Baum, C., Lin, H., Oechsner, S.: Towards practical lattice-based one-time link-
able ring signatures. Cryptology ePrint Archive, Report 2018/107 (2018). https://
eprint.iacr.org/2018/107
9. Bender, A., Katz, J., Morselli, R.: Ring signatures: stronger definitions, and con-
structions without random oracles. In: Halevi, S., Rabin, T. (eds.) TCC 2006.
LNCS, vol. 3876, pp. 60–79. Springer, Heidelberg (2006). https://doi.org/10.1007/
11681878 4
10. Berlekamp, E.R., McEliece, R.J., van Tilborg, H.: On the inherent intractability of
certain coding problems (corresp.). IEEE Trans. Inf. Theor. 24(3), 384–386 (1978)
11. Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.:
Random Oracles in a quantum world. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT
2011. LNCS, vol. 7073, pp. 41–69. Springer, Heidelberg (2011). https://doi.org/10.
1007/978-3-642-25385-0 3
12. Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words
in a linear code: application to McEliece’s cryptosystem and to narrow-sense BCH
codes of length 511. IEEE Trans. Inf. Theor. 44(1), 367–378 (1998)
13. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT
1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991). https://doi.org/
10.1007/3-540-46416-6 22
14. Courtois, N.T., Finiasz, M., Sendrier, N.: How to achieve a McEliece-based digital
signature scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp.
157–174. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1 10
15. Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and sim-
plified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994.
LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994). https://doi.org/10.1007/
3-540-48658-5 19
16. Dallot, L., Vergnaud, D.: Provably secure code-based threshold ring signatures.
In: Parker, M.G. (ed.) IMACC 2009. LNCS, vol. 5921, pp. 222–235. Springer,
Heidelberg (2009). https://doi.org/10.1007/978-3-642-10868-6 13
17. Damgård, I.: On σ-protocols. Lecture Notes, University of Aarhus, Department for
Computer Science (2002)
18. Ezerman, M.F., Lee, H.T., Ling, S., Nguyen, K., Wang, H.: A provably secure group
signature scheme from code-based assumptions. In: Iwata, T., Cheon, J.H. (eds.)
ASIACRYPT 2015. LNCS, vol. 9452, pp. 260–285. Springer, Heidelberg (2015).
https://doi.org/10.1007/978-3-662-48797-6 12
19. Faugre, J., Gauthier-Umaa, V., Otmani, A., Perret, L., Tillich, J.: A distinguisher
for high-rate mceliece cryptosystems. IEEE Trans. Inf. Theor. 59(10), 6830–6844
(2013)
20. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and
signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp.
186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7 12
21. Fujisaki, E., Suzuki, K.: Traceable ring signature. In: Okamoto, T., Wang, X. (eds.)
PKC 2007. LNCS, vol. 4450, pp. 181–200. Springer, Heidelberg (2007). https://
doi.org/10.1007/978-3-540-71677-8 13
22. Jain, A., Krenn, S., Pietrzak, K., Tentes, A.: Commitments and efficient zero-
knowledge proofs from learning parity with noise. In: Wang, X., Sako, K. (eds.)
ASIACRYPT 2012. LNCS, vol. 7658, pp. 663–680. Springer, Heidelberg (2012).
https://doi.org/10.1007/978-3-642-34961-4 40
A Code-Based Linkable Ring Signature Scheme 219
23. Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Linkable ring signature with uncondi-
tional anonymity. IEEE Trans. Knowl. Data Eng. 26(1), 157–165 (2014)
24. Liu, J.K., Wei, V.K., Wong, D.S.: Linkable spontaneous anonymous group signa-
ture for Ad Hoc groups. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP
2004. LNCS, vol. 3108, pp. 325–335. Springer, Heidelberg (2004). https://doi.org/
10.1007/978-3-540-27800-9 28
25. Liu, J.K., Wong, D.S.: Linkable ring signatures: security models and new schemes.
In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganà, A., Lee, H.P., Mun, Y.,
Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 614–623. Springer,
Heidelberg (2005). https://doi.org/10.1007/11424826 65
26. Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.)
ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001).
https://doi.org/10.1007/3-540-45682-1 32
27. van Saberhagen, N.: Cryptonote v 2.0 (2013)
28. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete log-
arithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997).
https://doi.org/10.1137/S0097539795293172
29. Stern, J.: A new identification scheme based on syndrome decoding. In: Stinson,
D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13–21. Springer, Heidelberg (1994).
https://doi.org/10.1007/3-540-48329-2 2
30. Torres, W.A., et al.: Post-quantum one-time linkable ring signature and application
to ring confidential transactions in blockchain (lattice ringCT v1.0). Cryptology
ePrint Archive, Report 2018/379 (2018). https://eprint.iacr.org/2018/379
31. Tsang, P.P., Wei, V.K.: Short linkable ring signatures for e-voting, e-cash and
attestation. In: Deng, R.H., Bao, F., Pang, H.H., Zhou, J. (eds.) ISPEC 2005.
LNCS, vol. 3439, pp. 48–60. Springer, Heidelberg (2005). https://doi.org/10.1007/
978-3-540-31979-5 5
32. Tsang, P.P., Wei, V.K., Chan, T.K., Au, M.H., Liu, J.K., Wong, D.S.: Separa-
ble linkable threshold ring signatures. In: Canteaut, A., Viswanathan, K. (eds.)
INDOCRYPT 2004. LNCS, vol. 3348, pp. 384–398. Springer, Heidelberg (2004).
https://doi.org/10.1007/978-3-540-30556-9 30
33. Unruh, D.: Post-quantum security of Fiat-Shamir. In: Takagi, T., Peyrin, T. (eds.)
ASIACRYPT 2017. LNCS, vol. 10624, pp. 65–95. Springer, Cham (2017). https://
doi.org/10.1007/978-3-319-70694-8 3
34. Zheng, D., Li, X., Chen, K.: Code-based ring signature scheme. Int. J. Netw. Secur.
5(2), 154–157 (2007)