The invention discloses an identity-based traceable ring signature authentication protocol, comprising the steps of I, initializing a system, to be specific, generating a secret key and selecting parameters; II, generating and verifying a signature, to be specific, allowing a user to generate a ring signature, and allowing a receiver to verify validity of the signature; III, generating and verifying tracing evidence, to be specific, allowing the user to generate tracing evidence, and allowing a verifier to verify legality of the evidence. The identity-based traceable ring signature authentication protocol has the advantages that a signer can be effectively traced at the premise of implementing authentication security, and collusion attack can be resisted; since a signature of fixed lengthis generated based on a collision-resistant accumulator and signature of knowledge and the length is not proportional to the number of ring members, communication cost is effectively reduced.