| 注册
首页|期刊导航|网络安全与数据治理|基于Dilithium的可追踪环签名方案

基于Dilithium的可追踪环签名方案

刘健 王伊婷 严妍 霍珊珊 李艳俊

网络安全与数据治理2025,Vol.44Issue(6):20-27,8.
网络安全与数据治理2025,Vol.44Issue(6):20-27,8.DOI:10.19358/j.issn.2097-1788.2025.06.003

基于Dilithium的可追踪环签名方案

A traceable ring signature scheme based on Dilithium algorithm

刘健 1王伊婷 2严妍 3霍珊珊 2李艳俊2

作者信息

  • 1. 中国电子科技集团公司第十五研究所 信息产业信息安全测评中心,北京 100083||清华大学 网络科学与网络空间研究院,北京 100084
  • 2. 中国电子科技集团公司第十五研究所 信息产业信息安全测评中心,北京 100083
  • 3. 中国网络安全审查认证和市场监管大数据中心,北京 100045
  • 折叠

摘要

Abstract

Traditional ring signature schemes based on number theory problems face severe security threats,and their com-pletely anonymous characteristics are easily abused for illegal activities.As a variant of ring signature,the trackable ring sig-nature can be traced while satisfying anonymity,while also tracking malicious signatures to avoid anonymity abuse,achieving controllable supervision of the signer.The post-quantum digital signature solution Dilithium has the advantages of small over-head,fast computing and resistance to quantum attacks.A traceable ring signature scheme based on Dilithium is proposed,combining the NIST standardized signature algorithm Dilithium with controllable anonymity for the first time to achieve the dual goals of privacy protection and abuse traceability against quantum attacks.Under the random oracle model,it is proved that this scheme is non-forgery,anonymous,linkability and traceability.At the same time,this paper designs a cross-chain transaction solution based on Dilithium traceable ring signature algorithm to meet the privacy protection of data transactions.Compared with other schemes,this scheme has significantly reduced computational overhead,while communication overhead still needs further optimization.

关键词

Dilithium算法/可追踪环签名/哈希锁定/随机预言机模型

Key words

Dilithium algorithm/traceable ring signature/hash lock/random oracle model

分类

信息技术与安全科学

引用本文复制引用

刘健,王伊婷,严妍,霍珊珊,李艳俊..基于Dilithium的可追踪环签名方案[J].网络安全与数据治理,2025,44(6):20-27,8.

基金项目

云南省区块链应用技术重点实验室开放课题(202305AG340008) (202305AG340008)

网络安全与数据治理

2097-1788

访问量6
|
下载量0
段落导航相关论文