{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:30:26Z","timestamp":1768836626522,"version":"3.49.0"},"reference-count":35,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T00:00:00Z","timestamp":1662595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFD1100603"],"award-info":[{"award-number":["2020YFD1100603"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["61762048"],"award-info":[{"award-number":["61762048"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["20212BAB202015"],"award-info":[{"award-number":["20212BAB202015"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["20221ZDF04048"],"award-info":[{"award-number":["20221ZDF04048"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020YFD1100603"],"award-info":[{"award-number":["2020YFD1100603"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762048"],"award-info":[{"award-number":["61762048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["20212BAB202015"],"award-info":[{"award-number":["20212BAB202015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["20221ZDF04048"],"award-info":[{"award-number":["20221ZDF04048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["2020YFD1100603"],"award-info":[{"award-number":["2020YFD1100603"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["61762048"],"award-info":[{"award-number":["61762048"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20212BAB202015"],"award-info":[{"award-number":["20212BAB202015"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20221ZDF04048"],"award-info":[{"award-number":["20221ZDF04048"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Central Guide to Local Science and Technology Development","award":["2020YFD1100603"],"award-info":[{"award-number":["2020YFD1100603"]}]},{"name":"Central Guide to Local Science and Technology Development","award":["61762048"],"award-info":[{"award-number":["61762048"]}]},{"name":"Central Guide to Local Science and Technology Development","award":["20212BAB202015"],"award-info":[{"award-number":["20212BAB202015"]}]},{"name":"Central Guide to Local Science and Technology Development","award":["20221ZDF04048"],"award-info":[{"award-number":["20221ZDF04048"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Traditional ring signature algorithms suffer from large signature data capacity and low speed of signature and verification during collective signing. In this work, we propose a representative ring signature algorithm based on smart contracts. By collecting the opinions of the signatory based on multiparty secure computation, the proposed technique protects the privacy of the signatory during the data interaction process in the consortium chain. Moreover, the proposed method uses smart contracts to organize the signature process and formulate a signature strategy of \u201cone encryption per signature\u201d to prevent signature forgery. It uses the Hyperledger Fabric framework as the signature test platform of the consortium chain to perform the experiments. We compare the results of the proposed method with the ECC ring signature scheme. The experimental results show that in the worst case, the signature volume of the proposed method decreases by more than two times, and the signature speed and verification speed increase by more than three times. Therefore, in the collective signature scenario of transaction verification in the consortium chain, the proposed method is verified to be innovative and practical.<\/jats:p>","DOI":"10.3390\/s22186805","type":"journal-article","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T07:05:56Z","timestamp":1662620756000},"page":"6805","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Representative Ring Signature Algorithm Based on Smart Contract"],"prefix":"10.3390","volume":"22","author":[{"given":"Qiude","family":"Li","sequence":"first","affiliation":[{"name":"School of Software, Jiangxi Agricultural University, Nanchang 330045, China"}]},{"given":"Wenlong","family":"Yi","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Agricultural University, Nanchang 330045, China"},{"name":"Faculty of Computer Science and Technology, Saint Petersburg Electrotechnical University \u201cLETI\u201d, 197022 Saint Petersburg, Russia"}]},{"given":"Xiaomin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Agricultural University, Nanchang 330045, China"},{"name":"Key Laboratory of Poyang Lake Watershed Agricultural Resources and Ecology of Jiangxi Province, Jiangxi Agricultural University, Nanchang 330045, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4611-8533","authenticated-orcid":false,"given":"Hua","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Software, Jiangxi Agricultural University, Nanchang 330045, China"}]},{"given":"Igor","family":"Gerasimov","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Technology, Saint Petersburg Electrotechnical University \u201cLETI\u201d, 197022 Saint Petersburg, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,8]]},"reference":[{"key":"ref_1","first-page":"231","article-title":"Blockchain and the related issues: A review of current research topics","volume":"5","author":"Lu","year":"2018","journal-title":"J. Manag. Anal."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1186\/s13638-019-1473-6","article-title":"Securing e-voting based on blockchain in P2P network","volume":"2019","author":"Yi","year":"2019","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"117134","DOI":"10.1109\/ACCESS.2019.2936094","article-title":"A survey of blockchain from the perspectives of applications, challenges, and opportunities","volume":"7","author":"Monrat","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"176838","DOI":"10.1109\/ACCESS.2019.2957660","article-title":"A comparative analysis of blockchain architecture and its applications: Problems and recommendations","volume":"7","author":"Syed","year":"2019","journal-title":"IEEE Access"},{"key":"ref_5","first-page":"80","article-title":"The blockchain: State-of-the-art and research challenges","volume":"15","author":"Lu","year":"2019","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_6","unstructured":"Nakamoto, S. (2022, September 06). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Li, Q., Yi, W., Zhao, X., Zhao, Y., Yin, H., and Xu, Y. (2021, January 21\u201323). Design and Evaluation of a High-performance Support System for Credibility Tracing of Agricultural Products. Proceedings of the 2021 IV International Conference on Control in Technical Systems (CTS), St. Petersburg, Russia.","DOI":"10.1109\/CTS53513.2021.9562828"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yi, W., Li, Q., Yin, H., Tang, H., and Zhao, Y. (2021, January 26\u201328). Efficient User Inspection Algorithm Based on Dual Bloom Filters Oriented for Blockchain Data Management Systems. Proceedings of the 2021 XXIV International Conference on Soft Computing and Measurements (SCM), St. Petersburg, Russia.","DOI":"10.1109\/SCM52931.2021.9507099"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"012115","DOI":"10.1088\/1742-6596\/1864\/1\/012115","article-title":"Blockchain-based approach to achieve credible traceability of agricultural product transactions","volume":"2021","author":"Yi","year":"2021","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Fang, Y., and Chen, P. (2022). Hint: Harnessing the wisdom of crowds for handling multi-phase tasks. Neural Comput. Appl., 1\u201323.","DOI":"10.1007\/s00521-021-06825-7"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.jom.2018.09.001","article-title":"Structural anatomy and evolution of supply chain alliance networks: A multi-method approach","volume":"63","author":"Park","year":"2018","journal-title":"J. Oper. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MCC.2018.011791712","article-title":"Blockchain: A panacea for healthcare cloud-based data security and privacy?","volume":"5","author":"Esposito","year":"2018","journal-title":"IEEE Cloud Comput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"58241","DOI":"10.1109\/ACCESS.2018.2890736","article-title":"Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_14","unstructured":"Uchibeke, U.U., Schneider, K.A., Kassani, S.H., and Deters, R. (August, January 30). Blockchain access control Ecosystem for Big Data security. Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2020.03.005","article-title":"A blockchain based decentralized data security mechanism for the Internet of Things","volume":"141","author":"Ge","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Akkar, M.-L., and Giraud, C. (2001, January 14\u201316). An implementation of DES and AES, secure against some attacks. Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Berlin\/Heidelberg, Germany.","DOI":"10.1007\/3-540-44709-1_26"},{"key":"ref_17","first-page":"9053","article-title":"RSA and ECC: A comparative analysis","volume":"12","author":"Mahto","year":"2017","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.tcs.2021.09.034","article-title":"Physical zero-knowledge proof for ripple effect","volume":"895","author":"Ruangwises","year":"2021","journal-title":"Theor. Comput. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., and Tauman, Y. (2001, January 9\u201313). How to leak a secret. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1109\/TETC.2020.2993032","article-title":"Circuit copyright blockchain: Blockchain-based homomorphic encryption for IP circuit protection","volume":"9","author":"Liang","year":"2020","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_21","unstructured":"Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., and Virza, M. (2014, January 18\u201321). Zerocash: Decentralized anonymous payments from bitcoin. Proceedings of the 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"204441","DOI":"10.1109\/ACCESS.2020.3036811","article-title":"Preserving Privacy in Mobile Health Systems Using Non-Interactive Zero-Knowledge Proof and Blockchain","volume":"8","author":"Tomaz","year":"2020","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"181733","DOI":"10.1109\/ACCESS.2020.3028189","article-title":"Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5195\/ledger.2016.34","article-title":"Ring confidential transactions","volume":"1","author":"Noether","year":"2016","journal-title":"Ledger"},{"key":"ref_25","unstructured":"Wu, Y. (2017). An e-voting system based on blockchain and ring signature. [Master\u2019s Thesis, University of Birmingham]."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"62058","DOI":"10.1109\/ACCESS.2019.2916345","article-title":"Homomorphic consortium blockchain for smart home system sensitive data privacy preserving","volume":"7","author":"She","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1049\/iet-cps.2018.5054","article-title":"Distributed meter data aggregation framework based on Blockchain and homomorphic encryption","volume":"4","author":"Wang","year":"2019","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"8832341","DOI":"10.1155\/2020\/8832341","article-title":"A homomorphic encryption and privacy protection method based on blockchain and edge computing","volume":"2020","author":"Yan","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Mishra, S., Sahu, R.A., Padhye, S., and Yadav, R.S. (2011, January 12\u201314). Efficient ID-based multi-proxy signature scheme from bilinear pairing based on k-plus problem. Proceedings of the International Conference on Integrated Computing Technology, Berlin\/Heidelberg, Germany.","DOI":"10.1109\/ICECTECH.2011.5942060"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","article-title":"The state of elliptic curve cryptography","volume":"19","author":"Koblitz","year":"2000","journal-title":"Des. Codes Cryptogr."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"015202","DOI":"10.1103\/PhysRevC.103.015202","article-title":"Confirming the Existence of the strong CP Problem in Lattice QCD with the Gradient Flow","volume":"103","author":"Dragos","year":"2021","journal-title":"Phys. Rev. C"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"127884","DOI":"10.1109\/ACCESS.2020.3007691","article-title":"Revocable attribute-based signature for blockchain-based healthcare system","volume":"8","author":"Su","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"76765","DOI":"10.1109\/ACCESS.2020.2987831","article-title":"A blockchain privacy protection scheme based on ring signature","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"ref_34","unstructured":"Torres, W.A.A., Steinfeld, R., Sakzad, A., Liu, J.K., Kuchta, V., Bhattacharjee, N., Au, M.H., and Cheng, J. (2018, January 11\u201313). Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1. 0). Proceedings of the Australasian Conference on Information Security and Privacy, Cham, Switzerland."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Herranz, J., and S\u00e1ez, G. (2003, January 8\u201310). Forking lemmas for ring signature schemes. Proceedings of the International Conference on Cryptology in India, New Delhi, India.","DOI":"10.1007\/978-3-540-24582-7_20"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6805\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:27:33Z","timestamp":1760142453000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/18\/6805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,8]]},"references-count":35,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["s22186805"],"URL":"https:\/\/doi.org\/10.3390\/s22186805","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,8]]}}}