Timed Anonymous Ring Signature with Application to Bidding Systems

Xiuju Huang, Cong Zuo*, Jun Shao, Junke Duan, Wei Wang, Yin Meng, Licheng Wang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Ring signatures enable a user to sign a message on behalf of a group while preserving both anonymity and unforgeability. Despite these strong privacy guarantees, they present regulatory challenges. To address these issues, we introduce a novel cryptographic primitive: timed anonymous ring signatures (TARS). Unlike group signatures, which rely on a trusted third party, TARS maintains the decentralization and unforgeability of traditional ring signatures while incorporating timed anonymity, allowing the signer’s identity to be disclosed by any user after a predetermined time period, denoted as T. To realize this, we propose a new CCA-secure timed public key encryption (TPKE) scheme that ensures correct decryption without the secret key after the time T. Building upon TPKE, we present two concrete TARS constructions that guarantee anonymity until time T and unforgeability at all times. To demonstrate its applicability, we apply TARS to a decentralized bidding system that is anticollusion between the auctioneer and the bidders. The system ensures anonymous bidding while disclosing the winner’s identity after the bid announcement, maintaining a transparent, fair, and decentralized bidding process. Finally, experimental evaluations confirm the practicality and efficiency of the proposed schemes. Crucially, the TARS scheme extends conventional ring signature schemes with timed anonymity by introducing only a moderate computational overhead (experimentally measured at ≈1.37 seconds under our configuration) while preserving their cryptographic robustness.

Original languageEnglish
JournalIEEE Transactions on Information Forensics and Security
DOIs
Publication statusAccepted/In press - 2025
Externally publishedYes

Keywords

  • Bidding system
  • Ring signatures
  • Timed anonymity
  • Timed public-key encryption

Fingerprint

Dive into the research topics of 'Timed Anonymous Ring Signature with Application to Bidding Systems'. Together they form a unique fingerprint.

Cite this