Research Article

A Postquantum Linkable Ring Signature Scheme from Coding Theory

Algorithm 2

The proposed underlying ZK protocol.
(1)Public parameters:.
(2)Private key: Samples and .
(3)Public key:, where .
(4)Prover:
 (i) Samples the following uniformly random objects:
  
 (ii) Sets ,
  ,
  .
 (iii) Sets the as .
(5)Verifier:
 (i) Samples the .
(6)Prover:
 (i) If , sets .
 (ii) If , sets .
 (iii) If , sets .
 (iv) Sends .
(7)Verifier:
 (i) If , checks if and are true.
 (ii) If , checks if and are true.
 (iii) If , checks if and , are true.