Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm

被引:0
|
作者
Peng C. [1 ]
Luo M. [1 ]
He D. [1 ]
Huang X. [2 ]
机构
[1] School of Cyber Science and Engineering, Wuhan University, Wuhan
[2] College of Computer and Cyber Security, Fujian Normal University, Fuzhou
基金
中国国家自然科学基金;
关键词
Adaptor signature; Atomic exchange; Blockchain technology; Payment channel; SM2; signature;
D O I
10.7544/issn1000-1239.2021.20210645
中图分类号
学科分类号
摘要
The adaptor signature scheme is an extension of the standard digital signature, which can create a "pre-signature" that implies the state of a hard relation (such as discrete logarithm problems) and can be transformed into a completed signature by the witness of the hard relation. The completed signature can be verified by the verification algorithm of a standard signature scheme. Intuitively, an adaptor signature has two properties: 1)only users who know the witness can transform the pre-signature into a completed signature; 2)any user may extract the witness through a pre-signature and a completed signature. Thus, the adaptor signature scheme can provide the atomic exchange property in the blockchain, and has been proved to be very widely used in practice. Based on the SM2 digital signature algorithm, a new adaptor signature scheme (SM2-AS) is constructed in this paper. This scheme can effectively match the SM2 signature scheme's key generation, signature generation and signature verification algorithms. Moreover, under the random oracle model, we prove that the SM2-AS scheme is secure, that is, it satisfies the pre-signature correctness, pre-signature adaptability, existential unforgeability under chosen plaintext attacks, and witness extractability. Through theoretical analysis and experimental test, the performance of the SM2-AS scheme is comparable to that of ECDSA-based adaptor signature scheme, but obviously weaker than that of the Schnorr-based adaptor signature scheme. © 2021, Science Press. All right reserved.
引用
收藏
页码:2278 / 2286
页数:8
相关论文
共 17 条
  • [1] Yu Hui, Zhang Zongyang, Liu Jianwei, Research on scaling technology of bitcoin blockchain, Journal of Computer Research and Development, 54, 10, pp. 2390-2403, (2017)
  • [2] Stress test prepares visanet for the most wonderful time of the year
  • [3] Payment Channels
  • [4] Lightning Network
  • [5] The Raiden Network
  • [6] Zhu Liehuang, Gao Feng, Shen Meng, Et al., Survey on privacy preserving techniques for blockchain technology, Journal of Computer Research and Development, 54, 10, pp. 2170-2186, (2017)
  • [7] Poelstra A., Scriptless scripts
  • [8] Aumayr L, Ersoy O, Erwig A, Et al., Generalized bitcoin-compatible channels, IACR Cryptology ePrint Archive, 2020, (2020)
  • [9] Fournier L., One-time verifiably encrypted signatures aka adaptor signatures
  • [10] Malavolta G, Moreno-Sanchez P, Schneidewind C, Et al., Anonymous multi-hop locks for blockchain scalability and interoperability, Proc of the 26th Annual Network and Distributed System Security Symp, NDSS 2019, (2019)