: The corresponding private key.
: keyImage, anti-double-flower logo
: What to sign.
:? ***n, which is used to generate the public key set of the ring.
: hash function, such as Keccak.
:? Then turn it into a point on the elliptic curve.
And how to generate the meeting will be introduced in other articles. The above definition has the following mathematical relationship:
?
Suppose there are n accounts * * * used to generate the ring, in which the serial number of the real signature account is S.
Generate a first set of random numbers, ***n, which is recorded as
Generate a second set of random numbers, ***n- 1, recorded as
1 & gt; Generate set, ***n, recorded as
So you get n, and for the sake of intuition, the values of n are listed as follows:
2> generate set, ***n, recorded as
So you get n, and for the sake of intuition, the values of n are listed as follows:
3 & gt。 Organize a non-interactive challenge:
4> computing sets and sets:
? It should be noted here that all sums are the challenge values of formula (6), that is
5> Merge to get signature result:
1 & gt; Calculation and Settings:
2> verification:
1 & gt; The right side of the formula (1 1) mainly refers to the set and its value.
? Substitute (7) and (8) into (10) because (refer to formula (1) and formula (3)) are simultaneous (refer to formula (2)).
We can find that set and set should be the same in theory, and set and set are the same in theory.
Referring to Equation (6), it can be found that the value on the right side of Equation (1 1) is equal to the challenge.
The left side of 2> formula (1 1) is the sum of all elements.
According to formula (7), we know that
3> input-output analysis
The common parameters when signing are: the real signature corresponds to the public key, that is; Content to be signed;
The parameters that need to be input when signing are: other public keys used to confuse the signature; The real signature corresponds to the private key;
After the signature is completed, the public content is: signature, and the notice contains the anti-double flower logo.
1 & gt; Can it be generated randomly at the time of signature, instead of formula (2)
Answer: No, it is unqualified in the inspection, and the reference formula (13) will not be eliminated in the certificate.
2> Can you generate a valid ring signature without the correct private key?
A: No, you can't form a ring. Referring to equations (8), (12) and (13), without the private key, it will be impossible.
1.? /p/45985430