With standard digital signature (eg (CE) DSA, Schnorr, etc…) the verification process involves the signer's public key. This is a necessary condition, because the signature actually proves that the author has the corresponding secret key. But it is not always a sufficient condition.

Ordinary signature

cn01

The Circular Ring Signature is a more sophisticated scheme, which in fact may require several different public keys for verification. In the case of the ring signature, we have a group of individuals, each with their own private and public key. The statement created with ring signatures is that the signer of a given message is a member of the group. The main distinction with normal digital signature schemes is that the signer needs only one secret key, but a verifier cannot establish the exact identity of the signer. Therefore, if you encounter a ring signature with Alice, Bob and Carol's public keys, you can only expect one of these individuals to be the signer, but they won't be able to know who.

Circular Ring Signature

DinastyCoin ring signatureThis concept can be used to perform untraceable digital operations sent to the network using the public keys of other members of the circular signature ring one of which applies to the transaction. This approach demonstrates that the creator of the transaction is eligible to spend the amount indicated in the transaction, but his identity will be no different from the users whose public keys are found in his circular signature.

Untraceable transactions

dinastycoin transazioni non tracciabili

It should be noted that even doing foreign operations does not prevent you from spending the money anyway. The public key may appear in dozens of other circular signatures, but only as a factor of confusion (even if you have already used the corresponding secret key to sign your transaction). Also, if two users create ring signatures with the same set of public keys, the signatures will still be different (unless they use the same private key).

Unique One-time Keys