Netinfo Security ›› 2025, Vol. 25 ›› Issue (12): 1901-1913.doi: 10.3969/j.issn.1671-1122.2025.12.006

Previous Articles     Next Articles

A Proxy Ring Signature Scheme Based on SM9 Algorithm

ZHANG Xuefeng, WANG Kehang()   

  1. School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
  • Received:2025-03-03 Online:2025-12-10 Published:2026-01-06
  • Contact: WANG Kehang E-mail:wkh0503@163.com

Abstract:

In view of the application requirements of proxy ring signature in scenarios requiring high user identity protection, this paper proposed a proxy ring signature scheme based on SM9 digital signature algorithm. The scheme included six steps: setup, extract, proxydelegation, verifyproxy, sign and verify. The Key Generation Center uses the user ID to calculate the user’s key, and the original signer used the known information to calculate the proxy authorization, and then delegated the proxy authorization to the proxy signer. After the proxy signer verified the authentiecity of the authorization, the proxy ring signature was generated through the signature step, and the generated signature can be verified by the authentication algorithm. The scheme not only realizes the entrustment of signature rights, but also protects the privacy of signers through the anonymity of ring signatures. It is also proved that the scheme is unforgeable under adaptive selective message attacks under random prophecy model. The efficiency analysis shows that the proposed scheme has higher efficiency and better practicability.

Key words: SM9, digital signature, proxy ring signature

CLC Number: