Cryptology ePrint Archive: Report 2017/905

Shorter Ring Signatures from Standard Assumptions

Alonso González

Abstract: Ring signatures, introduced by Rivest, Shamir and Tauman (ASIACRYPT 2001), allow to sign a message on behalf of a set of users while guaranteeing authenticity and anonymity. Groth and Kohlweiss (EUROCRYPT 2015) and Libert et al. (EUROCRYPT 2016) constructed schemes with signatures of size logarithmic in the number of users. An even shorter ring signature, of size independent from the number of users, was recently proposed by Malavolta and Schroder (ASIACRYPT 2017). However, all these short signatures are obtained relying on strong and controversial assumptions. Namely, the former schemes are both proven secure in the random oracle model while the later requires non-falsifiable assumptions.

The most efficient construction under mild assumptions remains the construction of Chandran et al. (ICALP 2007) with a signature of size $\Theta(\sqrt{n})$, where $n$ is the number of users, and security is based on the Diffie-Hellman assumption in bilinear groups (the SXDH assumption in asymmetric bilinear groups).

In this work we construct an asymptotically shorter ring signature from the hardness of the Diffie-Hellman assumption in bilinear groups. Each signature comprises $\Theta(\sqrt[3]{n})$ group elements, signing a message requires computing $\Theta(\sqrt[3]{n})$ exponentiations, and verifying a signature requires $\Theta(n^{2/3})$ pairing operations. To the best of our knowledge, this is the first ring signature based on bilinear groups with $o(\sqrt{n})$ signatures and sublinear verification complexity.

Category / Keywords: public-key cryptography / Ring Signature, Bilinear Groups, Set Membership proof

Date: received 19 Sep 2017, last revised 17 Jan 2019

Contact author: alonso gonzalez at ens-lyon fr

Available format(s): PDF | BibTeX Citation

Note: This is a revised version and contains a new construction which is secure under the SXDH assumption (and not the permutation pairing assumption).

Version: 20190117:230747 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]