ABSTRACT
While reducing costs and improving data security, the new generation of informatics technologies such as blockchain also face problems of operation efficiency and privacy leakage, which have attracted extensive attention from researchers. Digital signature is one of the key technologies to solve the above problems. The group signature algorithm has the dual characteristics of protecting the privacy of signer identity and tracing effectively when disputes occur. The scheme we proposed can simultaneously solve the low efficiency of signature verification caused by the high time-consuming bilinear pairwise operation in existing group signature algorithms and the privacy leakage of signers caused by the vulnerability of single group administrators to malicious attacks. Compared with the SM2 digital signature algorithm of Chinese cryptographic standard, the proposed scheme increases the signature anonymization while maintaining the same signature and verification efficiency as the SM2 signature algorithm. Compared with Yang et al. 's scheme, the main computation overhead and communication bandwidth of the proposed protocol are significantly reduced. Therefore, the design scheme in this paper has stronger practicability and is more suitable for scenarios that require both efficiency and strong privacy protection, such as blockchain, anonymous certificate, electronic cash and electronic voting.
- Squarepants, Spongebob. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. SSRN Electronic Journal. 10.2139/ssrn.3977007.Google Scholar
- Rodríguez-Henríquez, F. & Ortiz-Arroyo, Daniel & García-Zamora, Claudia. (2007). Yet another improvement over the Mu–Varadharajan e-voting protocol. Computer Standards & Interfaces. 29. 471-480. 10.1016/j.csi.2006.11.003.Google Scholar
- Vidali, Janoš. (1991). Group Signatures. 547. 10.1007/3-540-46416-6_22.Google Scholar
- Rivest, Ronald & Shamir, Adi & Tauman, Yael. (2001). How to Leak a Secret. LNCS. 2248. 552-565. 10.1007/3-540-45682-1_32.Google Scholar
- Libert, Benoît & Ling, San & Nguyễn, Khoa & Wang, Huaxiong. (2017). Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash. 304-335. 10.1007/978-3-319-70700-6_11.Google Scholar
- Brickell, E.. (2022). An efficient protocol for anonymously providing assurance of the container of a private key.Google Scholar
- Zhu Guiqiong, Tan Liang, Chen Ju, Protection scheme for platform private data in direct anonymous attestation[J] Communications Technology, 2013, 46(6): 106–110.Google Scholar
- Zhang, J.-M & Zhao, Y.-J & Jiang, H.-B & Jia, X.-D & Wang, L.-M. (2012). Research on protection technology for location privacy in VANET. Tongxin Xuebao/Journal on Communications. 33. 180-189.Google Scholar
- Boyen, X., Waters, B. (2007). Full-Domain Subgroup Hiding and Constant-Size Group Signatures. In: Okamoto, T., Wang, X. (eds) Public Key Cryptography – PKC 2007. PKC 2007. Lecture Notes in Computer Science, vol 4450. Springer, Berlin, Heidelberg.Google Scholar
- Cheng, Xiangguo “A Practical ID-Based Group Signature Scheme.” J. Comput. 7 (2012): 2650-2654.Google Scholar
- Zhou Fucai, Xu Jian, Wang Lanlan, Chen Chen, Li Fuxiang. A Group Signature in the Composite Order Bilinear Groups [J]. Journal of Computers, 2012, 35(4): 654-663. (In Chinese)Google Scholar
- Yang YT, Cai JL, Zhang XW, Yuan Z. Privacy Preserving Scheme in Block Chain with Provably Secure Based on SM9 Algorithm. Journal of Software, 2019, 30(6): 1692-1704(in Chinese).Google Scholar
- Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au, Baocang Wang,Google Scholar
- Chen, Xiaofeng & Zhang, Fangguo & Kim, Kwangjo. A New ID-based Group Signature Scheme from Bilinear Pairings. IACR Cryptology ePrint Archive. 2003. 116.Google Scholar
- Shen N, Adam M. Ring confidential transactions. Ledger, 2016,1(1):1−18.Google Scholar
- He D, Zhang J, Chen B, Zhang Y. An identity-based digital signature method and system based on SM2, China, November 13, 2018. Patent Application Publication: No. CN10880- 9658A (in Chinese)Google Scholar
- ZhangZ, YangK, ZhangJ, ChenC. Security of the sm2 signature scheme against generalized key substitution attacks // Proceeding s of the International Conference on Research in Security Standardisation. Tokyo, Japan,2015:140-153.Google Scholar
- Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In: Proc. of the Conf. on the Theory and Application of Cryptographic Techniques. Berlin, Heidelberg: Springer-Verlag, 1986. 186−194.Google Scholar
- Yan Zheng. Provable security Theory and Methods——Cryptographic algorithms, Science Press, 2017. (in Chinese)Google Scholar
- GM/T 0003.2-2012, Public Key Cryptographic Algorithm SM2 based on Elliptic Curves—Part 2: Digital signature algorithm (2010). http://www.oscca.gov.cn/Google Scholar
- Faust S, Kohlweiss M, Marson G, Venturi D. On the non-malleability of the Fiat-Shamir transform // Proceedings of the International Conference on Cryptology in India.Kolkata, India,2012:60-79.Google Scholar
- DamgårdI.On Σ-protocols. Lecture Notes, University of Aarhus, Department for Computer Science, 2002.Google Scholar
- Zhao Zhen, Wu Ge, Lai Jianchang, Jiang Peng, Zhu Binrui, Mu Yi, Susilo, Guo Fuchun. Key Points and Methodology in Constructions and Security Proofs of Public-key Cryptosysems [J]. Journal of Cryptologic Research, 2019, 6(1): 1-17. (In Chinese)Google Scholar
- Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17(2):281–308, 1988.Google ScholarDigital Library
- Paterson, K.G. & Schuldt, Jacob. (2006). Efficient Identity-Based Signatures Secure in the Standard Model. IACR Cryptology ePrint Archive. 2006. 80. 10.1007/11780656_18.Google Scholar
- Lin Chao, Huang Xinyi, He Debiao. Efficient Range Proof Protocols Based on Chinese Cryptographic SM2 [J]. Journal of Computers,2022,45(1):148-159. (In Chinese)Google Scholar
- An efficient linkable group signature for payer tracing in anonymous cryptocurrencies,Google Scholar
- Future Generation Computer Systems, Volume 101,2019, Pages 29-38.Google Scholar
Index Terms
- An Identity-based Group Signature Approach on Decentralized System and Chinese Cryptographic SM2
Recommendations
A secure identity-based proxy multi-signature scheme
In a proxy multi-signature scheme, a designated proxy signer can generate the signature on behalf of a group of original signers. To our best knowledge, most of existing proxy multi-signature schemes are proposed in public key infrastructure setting, ...
A secure identity-based multi-proxy signature scheme
In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Plenty of multi-...
A Generic Construction of Identity-Based Group Signature
EIDWT '13: Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web TechnologiesIdentity-based public key cryptosystem allows the user to use his identity as the public key, which can be a good alternative for certificate-based public key setting. Group signature allows any member of a group to sign on behalf of the group without ...
Comments