Research Article
A Postquantum Linkable Ring Signature Scheme from Coding Theory
Algorithm 2
The proposed underlying ZK protocol.
| (1) | Public parameters:. | | (2) | Private key: Samples and . | | (3) | Public key:, where . | | (4) | Prover: | | | (i) Samples the following uniformly random objects: | | | | | | (ii) Sets , | | | , | | | . | | | (iii) Sets the as . | | (5) | Verifier: | | | (i) Samples the . | | (6) | Prover: | | | (i) If , sets . | | | (ii) If , sets . | | | (iii) If , sets . | | | (iv) Sends . | | (7) | Verifier: | | | (i) If , checks if and are true. | | | (ii) If , checks if and are true. | | | (iii) If , checks if and , are true. |
|