AIFL includes TARS-code and AIFL-code
A threshold-based accountable ring signature (TARS) protocol to provide anonymity properties to clients, is the design basis of the proposed AIFL. Compared with current ARS schemes[1], the proposed TARS has two main enhancements after utilizing Pedersen VSS[2]. First, the de-anonymization privilege is distributed to multiple aggregators, enhancing the system's security. Second, the sub-key verifiability of the aggregator is increased.
- (1)System Initialization
- (2)TARS Process
- (3)Decentralized Global Aggregation
- (4)Robust Incentive Mechanism
[1] J. Bootle, A. Cerulli, P. Chaidos, et al., “Short accountable ring signatures based on DDH” in Proc. Eur. Symp. Res. Comput. Secur., Springer, pp. 243-265, 2015.
[2] P. Blanchard, M. E. El. Mhamdi, R. Guerraoui, et al., “Machine learning with adversaries: Byzantine tolerant gradient descent,” Adv. Neur. Informat. Proc. Syst., vol. 30, 2017.