A. Leevik, V. Beliaev, Boris Stasenko, Vadim V. Davydov, S. Bezzateev
{"title":"经典和后量子环签名算法的回顾与分析","authors":"A. Leevik, V. Beliaev, Boris Stasenko, Vadim V. Davydov, S. Bezzateev","doi":"10.1109/ICUMT51630.2020.9222244","DOIUrl":null,"url":null,"abstract":"In this paper a review and analysis of ring signature algorithms based on discrete logarithm and code-based problems is made. The authors consider Linkable and Multilayer Linkable Spontaneous Anonymous Group Signatures which are based on the discrete logarithm problem. Taking into the account the fact that quantum computers have already been developed, we look at different variations of code-based signatures (linkable, multilayer linkable, traceable and threshold) and analyse the efficiency of their use. Finally, the analysis of these signatures is made and standard code-based algorithms are compared.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms\",\"authors\":\"A. Leevik, V. Beliaev, Boris Stasenko, Vadim V. Davydov, S. Bezzateev\",\"doi\":\"10.1109/ICUMT51630.2020.9222244\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper a review and analysis of ring signature algorithms based on discrete logarithm and code-based problems is made. The authors consider Linkable and Multilayer Linkable Spontaneous Anonymous Group Signatures which are based on the discrete logarithm problem. Taking into the account the fact that quantum computers have already been developed, we look at different variations of code-based signatures (linkable, multilayer linkable, traceable and threshold) and analyse the efficiency of their use. Finally, the analysis of these signatures is made and standard code-based algorithms are compared.\",\"PeriodicalId\":170847,\"journal\":{\"name\":\"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICUMT51630.2020.9222244\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICUMT51630.2020.9222244","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms
In this paper a review and analysis of ring signature algorithms based on discrete logarithm and code-based problems is made. The authors consider Linkable and Multilayer Linkable Spontaneous Anonymous Group Signatures which are based on the discrete logarithm problem. Taking into the account the fact that quantum computers have already been developed, we look at different variations of code-based signatures (linkable, multilayer linkable, traceable and threshold) and analyse the efficiency of their use. Finally, the analysis of these signatures is made and standard code-based algorithms are compared.