An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain

被引:145
|
作者
Lin, Qun [1 ]
Yan, Hongyang [2 ]
Huang, Zhengan [3 ]
Chen, Wenbin [3 ]
Shen, Jian [4 ]
Tang, Yi [5 ]
机构
[1] Hanshan Normal Univ, Inst Math & Stat, Chaozhou 521041, Peoples R China
[2] Nankai Univ, Coll Comp & Control Engn, Tianjin 300071, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[5] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
ID-based signature; homomorphic signature; bilinear pairings; random oracle; IDENTITY-BASED ENCRYPTION; INTEGRAL SOLUTION PROBLEM; CLOUD; EFFICIENT;
D O I
10.1109/ACCESS.2018.2809426
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certificate-based public key infrastructures and can be used to realize authentication in blockchain. Linearly homomorphic signature schemes allow to perform linear computations on authenticated data. And the correctness of the computation can be publicly verified. Although a series of homomorphic signature schemes have been designed recently, there are few homomorphic signature schemes designed in identity-based cryptography. In this paper, we construct a new ID-based linear homomorphic signature scheme, which avoids the shortcomings of the use of public-key certificates. The scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. The ID-based linearly homomorphic signature schemes can be applied in e-business and cloud computing. Finally, we show how to apply it to realize authentication in blockchain.
引用
收藏
页码:20632 / 20640
页数:9
相关论文
共 50 条
  • [1] Another ID-Based Proxy Signature Scheme and Its Extension
    ZHANG Jianhong1
    2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security
    3. Institute of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 33 - 36
  • [2] On the security of an ID-based anonymous proxy signature scheme and its improved scheme
    Zhang, Jianhong
    Mao, Jian
    Xu, Yuwei
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2013, 5 (03) : 181 - 188
  • [3] ID-based Signature Scheme with Tight Reduction
    Xin Xiangjun
    Huang Shoujia
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 347 - 351
  • [4] A Practical ID-Based Group Signature Scheme
    Cheng, Xiangguo
    Zhou, Shaojie
    Yu, Jia
    Li, Xin
    Ma, Huiran
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (11) : 2650 - 2654
  • [5] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [6] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [7] A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT
    Wu, Bin
    Wang, Caifen
    Yao, Hailong
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (02) : 852 - 872
  • [8] A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT
    Bin Wu
    Caifen Wang
    Hailong Yao
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 852 - 872
  • [9] Novel ID-Based Group Signature Scheme
    Zhang, Jianhong
    Geng, Qin
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12634 - 12637
  • [10] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205