Article
Computer Science, Information Systems
Qing Ye, Yongkang Lang, Hongfu Guo, Yongli Tang
Summary: In this paper, an efficient lattice-based traceable ring signature (TRS) scheme is proposed, which has the shortest signature length and the fastest signature generation speed among existing post-quantum TRS schemes. By proving its security assumptions in the random oracle model, the proposed scheme is applicable to various scenarios and demonstrated in a blockchain access control model.
INFORMATION SCIENCES
(2023)
Article
Computer Science, Information Systems
Chaoyang Li, Yuan Tian, Xiubo Chen, Jian Li
Summary: In this paper, an anti-quantum blind signature scheme based on the lattice assumption has been proposed to enhance security and efficiency in blockchain systems, combining lattice cryptography and blind signature technology. The proposed scheme meets the properties of blindness and one-more unforgeability while proving to be safe in the random oracle model. The efficiency analysis and comparison results show that the proposed scheme is more efficient and has a more stable signature size compared to similar literature and other cryptosystems.
INFORMATION SCIENCES
(2021)
Article
Engineering, Electrical & Electronic
Xia Feng, Kaiping Cui, Haobin Jiang, Liangmin Wang
Summary: In this paper, a consortium blockchain-based source authentication scheme for road condition monitoring (ACRoM) is proposed, which achieves source authentication by uploading traffic reports and constructing transactions based on the UTXO model. A transaction update mechanism is also proposed to ensure the scalability of ACRoM. The simulations show that ACRoM has low retrieval time and stable storage cost, while the computation cost of source authentication is improved compared to existing schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Quantum Science & Technology
Zhuo Wang, Jian Li, Xiu-Bo Chen, Chaoyang Li
Summary: With the development of quantum computing, traditional authentication of blockchain based on mathematical cryptography algorithms is no longer secure enough, and it is necessary to design a post-quantum signature algorithm to ensure the security of blockchain transactions. Existing quantum signature algorithms have some problems, so this article proposes a cross-chain transaction model that includes a quantum multi-signature notary mechanism and an assets quantum-freeze algorithm to improve the security and efficiency of blockchain.
QUANTUM INFORMATION PROCESSING
(2022)
Article
Physics, Multidisciplinary
Zhengying Cai, Shi Liu, Zhangyi Han, Rui Wang, Yuehua Huang
Summary: The study introduces a quantum blind multi-signature algorithm to protect industrial blockchain against quantum attacks, theoretically being absolutely secure. The algorithm involves four phases and is capable of providing good computational performance and blockchain scalability.
Article
Computer Science, Information Systems
Khaled Chait, Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh, Omar Aldabbas, Abdullah T. Al-Essa
Summary: The widespread adoption of blockchain technology has led to numerous advantages, including enhanced data integrity, transparency, and decentralization. However, as the number of transactions recorded into a blockchain increases, the size of the blockchain also grows significantly, posing challenges to the network's storage capacity and processing power. To address this issue, a cryptosystem based on RSA is proposed to provide aggregate signatures in blockchains, offering a solution to reduce block size and overall network traffic.
Article
Computer Science, Information Systems
Yi-Yang Xie, Xiu-Bo Chen, Yi-Xian Yang
Summary: This paper proposes a new lattice-based blind ring signature scheme to achieve complete anonymity of user identity privacy in blockchain transaction systems. The proposed scheme has strong computational security and high sampling success rate, and satisfies the requirements of anonymity, blindness, and one-more unforgeability.
SECURITY AND COMMUNICATION NETWORKS
(2022)
Article
Management
Soumya Basu, David Easley, Maureen O'Hara, Emin Gun Sirer
Summary: Blockchain-based cryptocurrencies need to address the issue of assigning priorities to competing transactions. The commonly used mechanism of offering fees fails to yield stable and predictable prices. We propose an alternative fee setting mechanism called StableFees based on uniform price auctions. Our protocol is manipulation-resistant and has demonstrated reduced fees for users and decreased variance of miner's fee income.
MANAGEMENT SCIENCE
(2023)
Article
Computer Science, Hardware & Architecture
Xue Chen, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao
Summary: This research proposes a privacy-preserving epidemic infection control scheme using lattice-based linkable ring signatures in blockchain. The scheme utilizes a blockchain with three ledgers to store information in a distributed manner, providing transparency and immunity from SPoF and DoS attacks. The scheme also introduces a lattice-based linkable ring signature scheme to ensure privacy in epidemic control. Security analysis shows that the scheme guarantees user anonymity, record unforgeability, signature linkability, link non-slanderability, and contact traceability. Performance evaluation demonstrates the efficiency of the scheme in time consumption, storage consumption, and system communication overhead, making it practical for epidemic and future pandemic privacy-preserving.
Article
Computer Science, Information Systems
Wei Zhang, Jiangshan Yu, Qingqiang He, Nan Zhang, Nan Guan
Summary: The proposed TICK client utilizes AVL hash tree to store unspent outputs, resolving the issue of traditional lightweight clients struggling to verify new transactions. TICK can update AVL hash tree within 1 second and generate proofs in O(log(NU)) time, making verification more efficient and fast.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Electrical & Electronic
Swathi Singh, Divya Satish, Sree Rathna Lakshmi
Summary: Smart parking systems in big cities face challenges of privacy breaches and single-point failures. A new scheme based on blockchain and privacy information retrieval offers improved privacy protection and parking discounts.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
(2021)
Article
Computer Science, Interdisciplinary Applications
Weisheng Lu, Jinfeng Lou, Liupengfei Wu
Summary: Reliable and accurate information is crucial for decision making in construction projects, but stakeholders may manipulate information, compromising information authentication and integrity. A proposed blockchain-based framework with smart contracts provides assurance mechanisms to enhance tampering detection accuracy.
JOURNAL OF COMPUTING IN CIVIL ENGINEERING
(2023)
Article
Engineering, Multidisciplinary
Abba Garba, Zhong Chen, Zhi Guan, Gautam Srivastava
Summary: The current PKI certificate authentication system has many security flaws and an unbalanced trust relationship. To address this issue, a robust and scalable domain authentication scheme based on blockchain technology has been implemented, requiring less storage capacity and bandwidth.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2021)
Article
Chemistry, Multidisciplinary
Weihan Yuan, Xiaoya Li, Mingyue Li, Liudong Zheng
Summary: Cross-domain authentication requires no trust gap between domains, and centralized institutions cannot meet data security needs. Therefore, a secure dynamic cross-domain authentication scheme is proposed, using group signature technology and blockchain distributed system architecture in IoT environment.
APPLIED SCIENCES-BASEL
(2023)
Article
Mathematics
Jan Lansky, Amir Masoud Rahmani, Saqib Ali, Nasour Bagheri, Masoumeh Safkhani, Omed Hassan Ahmed, Mehdi Hosseinzadeh
Summary: The paper introduces a lightweight authentication protocol BCmECC based on Elliptic Curve Cryptography, which relies on a public blockchain to validate users' public keys for security. The protocol is evaluated heuristically and formally, demonstrating a high level of security and comparing favorably with other blockchain-based authentication protocols in terms of security.
Article
Computer Science, Information Systems
Xiuhua Lu, Wei Yin, Qiaoyan Wen, Zhengping Jin, Wenmin Li
Article
Computer Science, Information Systems
Yuanbo Cui, Fei Gao, Yijie Shi, Wei Yin, Emmanouil Panaousis, Kaitai Liang
Article
Computer Science, Information Systems
Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang