Research Article
A Postquantum Linkable Ring Signature Scheme from Coding Theory
Algorithm 2
The proposed underlying ZK protocol.
(1) | Public parameters:. | (2) | Private key: Samples and . | (3) | Public key:, where . | (4) | Prover: | | (i) Samples the following uniformly random objects: | | | | (ii) Sets , | | , | | . | | (iii) Sets the as . | (5) | Verifier: | | (i) Samples the . | (6) | Prover: | | (i) If , sets . | | (ii) If , sets . | | (iii) If , sets . | | (iv) Sends . | (7) | Verifier: | | (i) If , checks if and are true. | | (ii) If , checks if and are true. | | (iii) If , checks if and , are true. |
|