Explore chapters and articles related to this topic
Implementing blockchain in information systems: a review
Published in Enterprise Information Systems, 2022
Yang Lu
In ring signatures, the signer first selects some other members, and then uses the public keys of the other members and the signer’s own public key to form a public key ring. The signer uses his private key and the public key on the public key ring to sign. Each transaction input person uses some public keys of unrelated users to generate a ring signature. Other members of the ring may not know whether they are contained in it or not. Ring signatures allow users to be hidden among a group of users. The verifier can determine that the signer is one of the ring members, but the signer’s identity is unknown. The ring where the signer is located constitutes an anonymous set (Rivest, Shamir, and Tauman 2006; Lu 2019a).