Identity-Based Threshold Group Signature Scheme of Blockchain Verification

被引:1
|
作者
Wang, Lipeng [1 ,2 ]
Hu, Mingsheng [1 ]
Jia, Zhijuan [1 ]
Cheng, Yage [1 ]
Fu, Junjun [1 ]
Wang, Yubo [1 ]
Gong, Bei [1 ]
机构
[1] Zhengzhou Normal Univ, Zhengzhou 450044, Peoples R China
[2] Peking Univ, Beijing 100871, Peoples R China
关键词
Blockchain; Confidential computation; Threshold group signature; Traceability; E-commerce;
D O I
10.1007/978-981-15-3418-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the e-commerce scenario, the signature schemes generally have to meet four requirements: public verification, integrity, traceable and efficiency. To achieve the above goals, the paper proposes a identity-based threshold group signature scheme which can not only simplify the process of key management, but also allow to trace the user identities. To protect the user privacy, the scheme blinds the user identities and stores them on the blockchain to prevent the malicious members from tampering with the content. Security analysis shows that the proposed signature, whose difficulty is equivalent to solve the discrete logarithm problem, achieves a high level of anonymity and can resist impersonation attacks. Computational complexity analysis shows that the new method with low computation overhead and high communication efficiency can be effectively adapted to the electronic commerce scene.
引用
下载
收藏
页码:144 / 158
页数:15
相关论文
共 50 条
  • [1] Efficiency identity-based threshold group signature scheme
    School of Electronic Engineering, Xidian Univ., Xi'an 710071, China
    不详
    Tongxin Xuebao, 2009, 5 (122-127):
  • [2] A new identity-based group signature scheme
    Cheng, Xiangguo
    Guo, Lifeng
    Yu, Jia
    Ma, Huiran
    Wu, Yuexiu
    International Journal of Computers and Applications, 2013, 35 (01) : 1 - 5
  • [3] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [4] New efficient batch verification for an identity-based signature scheme
    Hwang, Jung Yeon
    Choi, Doo Ho
    Cho, Hyunsook
    Song, Boyeon
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (15) : 2524 - 2535
  • [5] Identity-based threshold proxy signature scheme with known signers
    Bao, Haiyong
    Cao, Zhenfu
    Wang, Shengbao
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2006, 3959 : 538 - 546
  • [6] An identity-based threshold ring signature scheme based on the bilinear pairings
    Shang, Jiu-qing
    Xu, Qiu-liang
    Liu, Xin
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
  • [7] An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System
    Bao, Zijian
    He, Debiao
    Peng, Cong
    Luo, Min
    Choo, Kim-Kwang Raymond
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2023, 4 : 231 - 242
  • [8] On the security of an identity-based threshold proxy signature scheme with known signers
    Lu, Rongbo
    He, Dake
    Wang, Changji
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 210 - +
  • [10] Identity-based Group User Data Integrity Verification Scheme
    Yuan Y.-L.
    Zhang J.-B.
    Xu W.-S.
    Li Z.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (12): : 4758 - 4770