Identity-Based Threshold Group Signature Scheme of Blockchain Verification

被引:1
|
作者
Wang, Lipeng [1 ,2 ]
Hu, Mingsheng [1 ]
Jia, Zhijuan [1 ]
Cheng, Yage [1 ]
Fu, Junjun [1 ]
Wang, Yubo [1 ]
Gong, Bei [1 ]
机构
[1] Zhengzhou Normal Univ, Zhengzhou 450044, Peoples R China
[2] Peking Univ, Beijing 100871, Peoples R China
关键词
Blockchain; Confidential computation; Threshold group signature; Traceability; E-commerce;
D O I
10.1007/978-981-15-3418-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the e-commerce scenario, the signature schemes generally have to meet four requirements: public verification, integrity, traceable and efficiency. To achieve the above goals, the paper proposes a identity-based threshold group signature scheme which can not only simplify the process of key management, but also allow to trace the user identities. To protect the user privacy, the scheme blinds the user identities and stores them on the blockchain to prevent the malicious members from tampering with the content. Security analysis shows that the proposed signature, whose difficulty is equivalent to solve the discrete logarithm problem, achieves a high level of anonymity and can resist impersonation attacks. Computational complexity analysis shows that the new method with low computation overhead and high communication efficiency can be effectively adapted to the electronic commerce scene.
引用
下载
收藏
页码:144 / 158
页数:15
相关论文
共 50 条
  • [21] IBRS: An Efficient Identity-based Batch Verification Scheme for VANETs Based on Ring Signature
    Liu, Feng
    Wang, Qi
    2019 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2019,
  • [22] An identity-based signature and its threshold version
    Cheng, XG
    Liu, JM
    Wang, XM
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 973 - 977
  • [23] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [24] Identity-based threshold signature and mediated proxy signature schemes
    YU Yong YANG Bo State Key Laboratory of ISN
    The Journal of China Universities of Posts and Telecommunications, 2007, (02) : 69 - 74
  • [25] Identity-based authenticated blind signature scheme
    Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China
    不详
    Jisuanji Gongcheng, 2006, 14 (136-137):
  • [26] Identity-Based Linkable Ring Signature Scheme
    Deng, Lunzhi
    Jiang, Yuhong
    Ning, Bingqin
    IEEE ACCESS, 2019, 7 : 153969 - 153976
  • [27] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [28] An identity-based signature scheme for mobile business
    Wang, Maocai
    Hu, Hanping
    Dai, Guangming
    ICIC Express Letters, 2010, 4 (02): : 565 - 569
  • [29] Comments on an identity-based signature scheme for VANETs
    Song, Yaqing
    Xu, Chunxiang
    Zhang, Yuan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [30] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 114 - 119