4.6 Article

An Anti-Quantum Transaction Authentication Approach in Blockchain

期刊

IEEE ACCESS
卷 6, 期 -, 页码 5393-5401

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2017.2788411

关键词

Lattice; blockchain; transaction authentication; signature

资金

  1. NSFC [61502044]

向作者/读者索取更多资源

Blockchain is a new distributed and decentralized technology, and gradually attracts worldwide attention, but it is vulnerable to quantum attacks that would solve elliptic curve digital logarithm problem, which is mainly used for transaction authentication in blockchain. The key needed for authentication comes from the wallet. To ensure that the size of the wallet is fixed and easy to manage, deterministic wallets are required to be used. But if existing anti-quantum signature schemes, such as lattice-based signature are used directly in blockchain to solve the problem, it would have made the wallet bloat. In this paper, we present a novel anti-quantum transaction authentication scheme in the blockchain. In order to construct lightweight nondeterministic wallets, the key point is that public and private keys are generated from a set of master public and private key(Seed Key). We leverage on Bonsai Trees technology and propose a new authentication method which can extend a lattice space to multiple lattice spaces accompanied by the corresponding key. Every signature of a transaction uses a lattice space so as to ensure the randomness and the security of the master private key. And we give the complete security proof and analysis. This paper provides the theoretical support for the application of blockchain in the post quantum age.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method

Xiuhua Lu, Wei Yin, Qiaoyan Wen, Zhengping Jin, Wenmin Li

IEEE ACCESS (2018)

Article Computer Science, Information Systems

An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation

Yuanbo Cui, Fei Gao, Yijie Shi, Wei Yin, Emmanouil Panaousis, Kaitai Liang

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Delegation of Decryption Rights With Revocability From Learning With Errors

Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang

IEEE ACCESS (2018)

暂无数据