Skip to main content

2020 | OriginalPaper | Buchkapitel

Identity-Based Threshold Group Signature Scheme of Blockchain Verification

verfasst von : Lipeng Wang, Mingsheng Hu, Zhijuan Jia, Yage Cheng, Junjun Fu, Yubo Wang, Bei Gong

Erschienen in: Trusted Computing and Information Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the e-commerce scenario, the signature schemes generally have to meet four requirements: public verification, integrity, traceable and efficiency. To achieve the above goals, the paper proposes a identity-based threshold group signature scheme which can not only simplify the process of key management, but also allow to trace the user identities. To protect the user privacy, the scheme blinds the user identities and stores them on the blockchain to prevent the malicious members from tampering with the content. Security analysis shows that the proposed signature, whose difficulty is equivalent to solve the discrete logarithm problem, achieves a high level of anonymity and can resist impersonation attacks. Computational complexity analysis shows that the new method with low computation overhead and high communication efficiency can be effectively adapted to the electronic commerce scene.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, T.S., Hsiao, T.C., Chen, T.L.: An efficient threshold group signature scheme. In: TENCON 2004, pp. 13–16 (2004) Chen, T.S., Hsiao, T.C., Chen, T.L.: An efficient threshold group signature scheme. In: TENCON 2004, pp. 13–16 (2004)
3.
Zurück zum Zitat Dong, X., Jiajia, L., Zhonghua, S.: A new threshold signature scheme based on elliptic curve cryptosystem. J. Hangzhou Normal Univ. (Nat. Sci. Ed.) 12(1), 57–60 (2013) Dong, X., Jiajia, L., Zhonghua, S.: A new threshold signature scheme based on elliptic curve cryptosystem. J. Hangzhou Normal Univ. (Nat. Sci. Ed.) 12(1), 57–60 (2013)
4.
Zurück zum Zitat Yage, C., Mingsheng, H., Bei, G., Lipeng, W., Erfeng, X.: Dynamic threshold signature scheme with strong forward security. Comput. Eng. Appl. 1(23), 1–12 (2019) Yage, C., Mingsheng, H., Bei, G., Lipeng, W., Erfeng, X.: Dynamic threshold signature scheme with strong forward security. Comput. Eng. Appl. 1(23), 1–12 (2019)
5.
Zurück zum Zitat Wang, L., Hu, M., Jia, Z., Gong, B., Lei, Y.: A signature scheme applying on blockchain voting scene based on asmuth-bloom algorithm. In: IEEE 4th International Conference on Computer and Communications (2018) Wang, L., Hu, M., Jia, Z., Gong, B., Lei, Y.: A signature scheme applying on blockchain voting scene based on asmuth-bloom algorithm. In: IEEE 4th International Conference on Computer and Communications (2018)
6.
Zurück zum Zitat Hongwei, L., Weixin, X., Jianping, Y., Peng, Z.: Efficiency identity-based threshold group signature scheme. J. Commun. 30(5), 122–127 (2009) Hongwei, L., Weixin, X., Jianping, Y., Peng, Z.: Efficiency identity-based threshold group signature scheme. J. Commun. 30(5), 122–127 (2009)
7.
Zurück zum Zitat Jie, Y., Xuri, Y., Wujun, Z.: Research on group signature with threshold value based on elliptic curve. J. Southeast Univ. (Nat. Sci. Ed.) 38(1), 43–46 (2008) Jie, Y., Xuri, Y., Wujun, Z.: Research on group signature with threshold value based on elliptic curve. J. Southeast Univ. (Nat. Sci. Ed.) 38(1), 43–46 (2008)
8.
Zurück zum Zitat Yufang, C., Tzerlong, C., Tzer-Shyong, C., Chihsheng, C.: A study on efficient group-oriented signature schemes for realistic application environment. Int. J. Innov. Comput. Inf. Control 8(4), 2713–2727 (2012) Yufang, C., Tzerlong, C., Tzer-Shyong, C., Chihsheng, C.: A study on efficient group-oriented signature schemes for realistic application environment. Int. J. Innov. Comput. Inf. Control 8(4), 2713–2727 (2012)
9.
Zurück zum Zitat Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179–1194 (2018) Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179–1194 (2018)
10.
Zurück zum Zitat Yehuda, L., Nof, A.: Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1837–1854 (2018) Yehuda, L., Nof, A.: Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1837–1854 (2018)
13.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, pp. 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, pp. 313–317 (1979)
14.
Zurück zum Zitat Dahshan, H., Kamal, A., Rohiem, A.: A threshold blind digital signature scheme using elliptic curve dlog-based cryptosystem. In: IEEE Vehicular Technology Conference, pp. 1–5 (2015) Dahshan, H., Kamal, A., Rohiem, A.: A threshold blind digital signature scheme using elliptic curve dlog-based cryptosystem. In: IEEE Vehicular Technology Conference, pp. 1–5 (2015)
15.
Zurück zum Zitat Lipeng, W., Mingsheng, H., Zhijuan, J., Bei, G., Jialei, Z.: A signature scheme applying on blockchain voting scene based on chinese remainder theorem. Appl. Res. Comput. 29(1), 1–8 (2018) Lipeng, W., Mingsheng, H., Zhijuan, J., Bei, G., Jialei, Z.: A signature scheme applying on blockchain voting scene based on chinese remainder theorem. Appl. Res. Comput. 29(1), 1–8 (2018)
17.
Zurück zum Zitat Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)CrossRef Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)CrossRef
18.
Zurück zum Zitat Yannan, L., Yong, Y., Geyong, M., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. 14(8), 72–83 (2017) Yannan, L., Yong, Y., Geyong, M., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. 14(8), 72–83 (2017)
19.
Zurück zum Zitat Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–559 (2013)CrossRef Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–559 (2013)CrossRef
20.
Zurück zum Zitat Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)CrossRef Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)CrossRef
21.
Zurück zum Zitat Wenting, S., Jing, Q., Jia, Y., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2019) Wenting, S., Jing, Q., Jia, Y., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2019)
Metadaten
Titel
Identity-Based Threshold Group Signature Scheme of Blockchain Verification
verfasst von
Lipeng Wang
Mingsheng Hu
Zhijuan Jia
Yage Cheng
Junjun Fu
Yubo Wang
Bei Gong
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-3418-8_11