4.6 Article

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain

期刊

IEEE ACCESS
卷 6, 期 -, 页码 20632-20640

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2809426

关键词

ID-based signature; homomorphic signature; bilinear pairings; random oracle

资金

  1. National Natural Science Foundation of China [61702125, 61472091]
  2. Scientific Research Foundation for Post-Doctoral Researchers of Guangzhou [gdbsh2016020]
  3. Natural Science Foundation of Guangdong Province for Distinguished Young Scholars [2014A030306020]
  4. Guangzhou Scholars Project for Universities of Guangzhou [1201561613]
  5. Science and Technology Planning Project of Guangdong Province, China [2015B010129015]
  6. National Natural Science Foundation for Outstanding Youth Foundation [61722203]
  7. State Key Laboratory of Cryptology, Beijing, China
  8. Program for Innovative Research Team in the Education Department of Guangdong Province [2015KCXTD014, 2016KCXTD017]

向作者/读者索取更多资源

Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certificate-based public key infrastructures and can be used to realize authentication in blockchain. Linearly homomorphic signature schemes allow to perform linear computations on authenticated data. And the correctness of the computation can be publicly verified. Although a series of homomorphic signature schemes have been designed recently, there are few homomorphic signature schemes designed in identity-based cryptography. In this paper, we construct a new ID-based linear homomorphic signature scheme, which avoids the shortcomings of the use of public-key certificates. The scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. The ID-based linearly homomorphic signature schemes can be applied in e-business and cloud computing. Finally, we show how to apply it to realize authentication in blockchain.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Software Engineering

Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios

Jing Li, Licheng Wang, Lihua Wang, Xianmin Wang, Zhengan Huang, Jin Li

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)

Article Computer Science, Hardware & Architecture

Outsourced privacy-preserving classification service over encrypted data

Tong Li, Zhengan Huang, Ping Li, Zheli Liu, Chunfu Jia

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

A remotely keyed file encryption scheme under mobile cloud computing

Li Yang, Ziyi Han, Zhengan Huang, Jianfeng Ma

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

Public audit for operation behavior logs with error locating in cloud storage

Hui Tian, Zhaoyi Chen, Chin-Chen Chang, Yongfeng Huang, Tian Wang, Zheng-an Huang, Yiqiao Cai, Yonghong Chen

SOFT COMPUTING (2019)

Article Computer Science, Theory & Methods

Simulation-based selective opening security for receivers under chosen-ciphertext attacks

Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li

DESIGNS CODES AND CRYPTOGRAPHY (2019)

Article Computer Science, Information Systems

Data security against receiver corruptions: SOA security for receivers from simulatable DEMs

Zhengan Huang, Junzuo Lai, Wenbin Chen, Tong Li, Yang Xiang

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Practical public key encryption with selective opening security for receivers

Zhengan Huang, Junzuo Lai, Wenbin Chen, Muhammad Raees-ul-Haq, Liaoliang Jiang

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing

Jing Li, Xianmin Wang, Zhengan Huang, Licheng Wang, Yang Xiang

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Theory & Methods

Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation

Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao

THEORETICAL COMPUTER SCIENCE (2020)

Article Computer Science, Hardware & Architecture

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key

Wenbin Chen, Jin Li, Zhengan Huang, Chongzhi Gao, Siuming Yiu, Zoe L. Jiang

Summary: This paper discusses proxy re-signature schemes, introduces different types of schemes, and proposes the first unidirectional infinite-use proxy re-signature scheme and identity-based unidirectional infinite-use proxy re-signature scheme based on lattice, proving their security in the random oracle model.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2021)

Article Computer Science, Information Systems

Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties

Ye Li, Zoe L. Jiang, Lin Yao, Xuan Wang, S. M. Yiu, Zhengan Huang

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Proceedings Paper Computer Science, Theory & Methods

Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures

Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li

PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I (2018)

Article Computer Science, Information Systems

Privacy-preserving outsourced classification in cloud computing

Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wen-Bin Chen, Kai Chen

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

A new efficient authorized private set intersection protocol from Schnorr signature and its applications

Yamin Wen, Zheng Gong, Zhengan Huang, Weidong Qiu

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)

暂无数据