Journal of Machine and Computing


An Efficient and Privacy Preserved Session Sharing for Unmanned Aerial Vehicle Communication Using Lattice Based Ring Signature Scheme



Journal of Machine and Computing

Received On : 19 May 2025

Revised On : 18 September 2025

Accepted On : 13 October 2025

Published On : 21 October 2025

Volume 06, Issue 01

Pages : 232-241


Abstract


Unmanned Aerial Vehicle (UAV) is playing an important role in various and diverse applications. UAV networks are designed with the support of efficient communication, secure, and privacy-preserved data exchange particularly for sensitive and mission-critical applications, like defensive surveillance, disaster response, civilian support, and smart city infrastructure. This paper presents an efficient and novel approach for establishing a secure session sharing in UAV networks through a Lattice-based Ring Signature Scheme (LRS). This paper presents a secure and privacy-preserved authentication scheme for large-scale UAV connection network using an Lattice-based Ring Signature Scheme. This technique offers a scalable and efficient solution for drone communication network. The proposed architecture incorporates a layered approach for establishing a strong connection between UAV devices and ground stations for ensuring streamlined data collection and processing. The proposed method has been designed with a strong ring signature scheme based on lattice cryptography. This technique is guaranty to achieve anonymity and authenticity by enabling any drone to sign data without exposing the signer's identity, thereby protecting device privacy. Ground controlling station and UAV operators can verified by using these signatures. The security analysis for the proposed ring signature scheme has been conducted through formal security analysis and this security analysis shows that the proposed scheme resilient to various attacks. The formal security analysis has been conducted by using formal security analysis with the help of game theory concepts by using correctness analysis, unforgeability, and unconditional anonymity. Performance analysis for the proposed technique has been conducted by using execution time analysis making it well-suited for resource-constrained devices, like UAV or Drones, supporting both scalability and security in real-world healthcare scenarios.


Keywords


Unmanned Aerial Vehicles, Session Sharing, Lattice, Ring Signature Scheme, Random Oracle Model, Cyber Defensive System.


  1. J. K. Liu, V. K. Wei, and D. S. Wong, “Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups,” Information Security and Privacy, pp. 325–335, 2004, doi: 10.1007/978-3-540-27800-9_28.
  2. X. Li, Y. Mei, J. Gong, F. Xiang, and Z. Sun, “A Blockchain Privacy Protection Scheme Based on Ring Signature,” IEEE Access, vol. 8, pp. 76765–76772, 2020, doi: 10.1109/access.2020.2987831.
  3. F. Tang, J. Pang, K. Cheng, and Q. Gong, “Multiauthority Traceable Ring Signature Scheme for Smart Grid Based on Blockchain,” Wireless Communications and Mobile Computing, vol. 2021, no. 1, Jan. 2021, doi: 10.1155/2021/5566430.
  4. J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, “Linkable Ring Signature with Unconditional Anonymity,” IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 1, pp. 157–165, Jan. 2014, doi: 10.1109/tkde.2013.17.
  5. T. Ta et al., “Efficient Unique Ring Signature for Blockchain Privacy Protection,” Information Security and Privacy, pp. 391–407, 2021, doi: 10.1007/978-3-030-90567-5_20.
  6. M. A. Rezazadeh Baee, L. Simpson, X. Boyen, E. Foo, and J. Pieprzyk, “Authentication strategies in vehicular communications: a taxonomy and framework,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, no. 1, May 2021, doi: 10.1186/s13638-021-01968-6.
  7. P. W. Shor, “Polynomial time algorithms for discrete logarithms and factoring on a quantum computer,” Algorithmic Number Theory, pp. 289–289, 1994, doi: 10.1007/3-540-58691-1_68.
  8. Zhang, J., Bai, W., & Jiang, Z. (2020). On the security of a practical constant-size ring signature scheme.International Journal of Network Security, 22(3), 394–398.
  9. D. Hoang Duong, W. Susilo, and H. T. N. Tran, “A Multivariate Blind Ring Signature Scheme,” The Computer Journal, vol. 63, no. 8, pp. 1194–1202, Nov. 2019, doi: 10.1093/comjnl/bxz128.
  10. C. Baum, H. Lin, and S. Oechsner, “Towards Practical Lattice-Based One-Time Linkable Ring Signatures,” Information and Communications Security, pp. 303–322, 2018, doi: 10.1007/978-3-030-01950-1_18.
  11. W. A. Alberto Torres et al., “Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0),” Information Security and Privacy, pp. 558–576, 2018, doi: 10.1007/978-3-319-93638-3_32.
  12. H. Zhang, F. Zhang, H. Tian, and M. H. Au, “Anonymous Post-Quantum Cryptocash,” Financial Cryptography and Data Security, pp. 461–479, 2018, doi: 10.1007/978-3-662-58387-6_25.
  13. Z. Liu, K. Nguyen, G. Yang, H. Wang, and D. S. Wong, “A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses,” Computer Security – ESORICS 2019, pp. 726–746, 2019, doi: 10.1007/978-3-030-29959-0_35.
  14. W. Beullens, S. Katsumata, and F. Pintore, “Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices,” Advances in Cryptology – ASIACRYPT 2020, pp. 464–492, 2020, doi: 10.1007/978-3-030-64834-3_16.
  15. S. Bouakkaz and F. Semchedine, “A certificateless ring signature scheme with batch verification for applications in VANET,” Journal of Information Security and Applications, vol. 55, p. 102669, Dec. 2020, doi: 10.1016/j.jisa.2020.102669.
  16. J. Liang, J. Huang, Q. Huang, L. Lan, and M. H. A. Au, “A Lattice-Based Certificateless Traceable Ring Signature Scheme,” Information, vol. 14, no. 3, p. 160, Mar. 2023, doi: 10.3390/info14030160.
  17. Z. Zhao, C. Hsu, L. Harn, Z. Xia, X. Jiang, and L. Liu, “Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones,” Cybersecurity, vol. 7, no. 1, Aug. 2024, doi: 10.1186/s42400-024-00247-3.
  18. H. Yu and Z. Lv, “Lattice-based ring signcryption for consortium blockchain,” Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 7, p. 101602, Jul. 2023, doi: 10.1016/j.jksuci.2023.101602.
  19. Yang, G., Liu, Z., Wong, D. S., Wang, H., & Zhang, F. (2022). Anti-quantum lattice-based ring signature scheme and applications in VANETs. Cluster Computing, 25, 2177–2191. https://doi.org/10.1007/s10586-021-03529-4.
  20. Peng, X., Guo, Y., & Wang, Z. (2022). Efficient lattice-based ring signature scheme without trapdoors for machine learning.Journal of Low Power Electronics and Applications, 12(3), Article 61. https://doi.org/10.3390/jlpea12030061.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani; Methodology: Hemalatha S, Sugirtha Thayalan and Sudha P; Software: Medikonda Swapna and Tamilarasi Rajamani; Data Curation: Hemalatha S, Sugirtha Thayalan and Sudha P; Writing-Original Draft Preparation: Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani; Visualization: Hemalatha S, Sugirtha Thayalan and Sudha P; Investigation: Medikonda Swapna and Tamilarasi Rajamani; Supervision: Hemalatha S, Sugirtha Thayalan and Sudha P; Validation: Medikonda Swapna and Tamilarasi Rajamani; Writing- Reviewing and Editing: Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


Authors thank Reviewers for taking the time and effort necessary to review the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani, “An Efficient and Privacy Preserved Session Sharing for Unmanned Aerial Vehicle Communication Using Lattice Based Ring Signature Scheme”, Journal of Machine and Computing, vol.6, no.1, pp. 232-241, 2026, doi: 10.53759/7669/jmc202606017.


Copyright


© 2026 Hemalatha S, Sugirtha Thayalan, Sudha P, Medikonda Swapna and Tamilarasi Rajamani. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.