An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain | IEEE Journals & Magazine | IEEE Xplore

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain


Abstract:

Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number,...Show More
Topic: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies

Abstract:

Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certificate-based public key infrastructures and can be used to realize authentication in blockchain. Linearly homomorphic signature schemes allow to perform linear computations on authenticated data. And the correctness of the computation can be publicly verified. Although a series of homomorphic signature schemes have been designed recently, there are few homomorphic signature schemes designed in identity-based cryptography. In this paper, we construct a new ID-based linear homomorphic signature scheme, which avoids the shortcomings of the use of public-key certificates. The scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. The ID-based linearly homomorphic signature schemes can be applied in e-business and cloud computing. Finally, we show how to apply it to realize authentication in blockchain.
Topic: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies
Published in: IEEE Access ( Volume: 6)
Page(s): 20632 - 20640
Date of Publication: 26 February 2018
Electronic ISSN: 2169-3536

Funding Agency:

Author image of Qun Lin
Institute of Mathematics and Statistics, Hanshan Normal University, Chaozhou, China
Qun Lin received the B.S. degree from the Department of Atmosphere Science, Nanjing University, in 1999, and the M.S. degree from the School of Mathematics and Computational Science, Sun Yat-sen University, in 2005. He is currently with the Institute of Mathematics and Statistics, Hanshan Normal University. His research interests include public-key cryptography and information security.
Qun Lin received the B.S. degree from the Department of Atmosphere Science, Nanjing University, in 1999, and the M.S. degree from the School of Mathematics and Computational Science, Sun Yat-sen University, in 2005. He is currently with the Institute of Mathematics and Statistics, Hanshan Normal University. His research interests include public-key cryptography and information security.View more
Author image of Hongyang Yan
College of Computer and Control Engineering, Nankai University, Tianjin, China
Hongyang Yan received the M.S. degrees from the School of Mathematics and Information Science, Guangzhou University, in 2016. She is currently pursuing the Ph.D. degree with Nankai University. Her research interests include secure access control, such as attribute-based cryptography and identity-based cryptography, and IoT secure.
Hongyang Yan received the M.S. degrees from the School of Mathematics and Information Science, Guangzhou University, in 2016. She is currently pursuing the Ph.D. degree with Nankai University. Her research interests include secure access control, such as attribute-based cryptography and identity-based cryptography, and IoT secure.View more
Author image of Zhengan Huang
School of Computer Science, Guangzhou University, Guangzhou, China
Zhengan Huang received the B.S. and M.S. degrees from the Department of Mathematics, Sun Yat-sen University, in 2009 and 2011, respectively, and the Ph.D. degree from the Department of Computer Science and Engineering, Shanghai Jiao Tong University, in 2015. He was a Security Engineer with Huawei Technologies Company Ltd., from 2015 to 2016. He is currently holds a post-doctoral position at Guangzhou University. His resea...Show More
Zhengan Huang received the B.S. and M.S. degrees from the Department of Mathematics, Sun Yat-sen University, in 2009 and 2011, respectively, and the Ph.D. degree from the Department of Computer Science and Engineering, Shanghai Jiao Tong University, in 2015. He was a Security Engineer with Huawei Technologies Company Ltd., from 2015 to 2016. He is currently holds a post-doctoral position at Guangzhou University. His resea...View more
Author image of Wenbin Chen
School of Computer Science, Guangzhou University, Guangzhou, China
Wenbin Chen received the M.S. degree in mathematics from the Institute of Software, Chinese Academy of Science, in 2003, and the Ph.D. degree in computer science from North Carolina State University, USA, in 2010. He is currently an Associate Professor with Guangzhou University. His research interests include theoretical computer science, such as lattice-based cryptography, algorithm design and analysis, computational com...Show More
Wenbin Chen received the M.S. degree in mathematics from the Institute of Software, Chinese Academy of Science, in 2003, and the Ph.D. degree in computer science from North Carolina State University, USA, in 2010. He is currently an Associate Professor with Guangzhou University. His research interests include theoretical computer science, such as lattice-based cryptography, algorithm design and analysis, computational com...View more
Author image of Jian Shen
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
Jian Shen received the M.E. and Ph.D. degrees in computer science from Chosun University, South Korea, in 2009 and 2012, respectively. Since 2012, he has been a Professor with the Nanjing University of Information Science and Technology, Nanjing, China. His research interests include public key cryptography, secure data sharing, and data auditing in cloud.
Jian Shen received the M.E. and Ph.D. degrees in computer science from Chosun University, South Korea, in 2009 and 2012, respectively. Since 2012, he has been a Professor with the Nanjing University of Information Science and Technology, Nanjing, China. His research interests include public key cryptography, secure data sharing, and data auditing in cloud.View more
Author image of Yi Tang
School of Mathematics and Information Science, Guangzhou University, Guangzhou, China
Yi Tang received the B.S. and M.S. degrees from the Department of Mathematics, Sun Yat-sen University, in 1988 and 1991, respectively, and the Ph.D. degree from the Department of Mathematics, Sun Yat-sen University, in 2003. He is currently a Professor with Guangzhou University. His research interests include network traffic analysis and information security.
Yi Tang received the B.S. and M.S. degrees from the Department of Mathematics, Sun Yat-sen University, in 1988 and 1991, respectively, and the Ph.D. degree from the Department of Mathematics, Sun Yat-sen University, in 2003. He is currently a Professor with Guangzhou University. His research interests include network traffic analysis and information security.View more

Author image of Qun Lin
Institute of Mathematics and Statistics, Hanshan Normal University, Chaozhou, China
Qun Lin received the B.S. degree from the Department of Atmosphere Science, Nanjing University, in 1999, and the M.S. degree from the School of Mathematics and Computational Science, Sun Yat-sen University, in 2005. He is currently with the Institute of Mathematics and Statistics, Hanshan Normal University. His research interests include public-key cryptography and information security.
Qun Lin received the B.S. degree from the Department of Atmosphere Science, Nanjing University, in 1999, and the M.S. degree from the School of Mathematics and Computational Science, Sun Yat-sen University, in 2005. He is currently with the Institute of Mathematics and Statistics, Hanshan Normal University. His research interests include public-key cryptography and information security.View more
Author image of Hongyang Yan
College of Computer and Control Engineering, Nankai University, Tianjin, China
Hongyang Yan received the M.S. degrees from the School of Mathematics and Information Science, Guangzhou University, in 2016. She is currently pursuing the Ph.D. degree with Nankai University. Her research interests include secure access control, such as attribute-based cryptography and identity-based cryptography, and IoT secure.
Hongyang Yan received the M.S. degrees from the School of Mathematics and Information Science, Guangzhou University, in 2016. She is currently pursuing the Ph.D. degree with Nankai University. Her research interests include secure access control, such as attribute-based cryptography and identity-based cryptography, and IoT secure.View more
Author image of Zhengan Huang
School of Computer Science, Guangzhou University, Guangzhou, China
Zhengan Huang received the B.S. and M.S. degrees from the Department of Mathematics, Sun Yat-sen University, in 2009 and 2011, respectively, and the Ph.D. degree from the Department of Computer Science and Engineering, Shanghai Jiao Tong University, in 2015. He was a Security Engineer with Huawei Technologies Company Ltd., from 2015 to 2016. He is currently holds a post-doctoral position at Guangzhou University. His research interests include public-key cryptography and information security.
Zhengan Huang received the B.S. and M.S. degrees from the Department of Mathematics, Sun Yat-sen University, in 2009 and 2011, respectively, and the Ph.D. degree from the Department of Computer Science and Engineering, Shanghai Jiao Tong University, in 2015. He was a Security Engineer with Huawei Technologies Company Ltd., from 2015 to 2016. He is currently holds a post-doctoral position at Guangzhou University. His research interests include public-key cryptography and information security.View more
Author image of Wenbin Chen
School of Computer Science, Guangzhou University, Guangzhou, China
Wenbin Chen received the M.S. degree in mathematics from the Institute of Software, Chinese Academy of Science, in 2003, and the Ph.D. degree in computer science from North Carolina State University, USA, in 2010. He is currently an Associate Professor with Guangzhou University. His research interests include theoretical computer science, such as lattice-based cryptography, algorithm design and analysis, computational complexity, and so on.
Wenbin Chen received the M.S. degree in mathematics from the Institute of Software, Chinese Academy of Science, in 2003, and the Ph.D. degree in computer science from North Carolina State University, USA, in 2010. He is currently an Associate Professor with Guangzhou University. His research interests include theoretical computer science, such as lattice-based cryptography, algorithm design and analysis, computational complexity, and so on.View more
Author image of Jian Shen
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China
Jian Shen received the M.E. and Ph.D. degrees in computer science from Chosun University, South Korea, in 2009 and 2012, respectively. Since 2012, he has been a Professor with the Nanjing University of Information Science and Technology, Nanjing, China. His research interests include public key cryptography, secure data sharing, and data auditing in cloud.
Jian Shen received the M.E. and Ph.D. degrees in computer science from Chosun University, South Korea, in 2009 and 2012, respectively. Since 2012, he has been a Professor with the Nanjing University of Information Science and Technology, Nanjing, China. His research interests include public key cryptography, secure data sharing, and data auditing in cloud.View more
Author image of Yi Tang
School of Mathematics and Information Science, Guangzhou University, Guangzhou, China
Yi Tang received the B.S. and M.S. degrees from the Department of Mathematics, Sun Yat-sen University, in 1988 and 1991, respectively, and the Ph.D. degree from the Department of Mathematics, Sun Yat-sen University, in 2003. He is currently a Professor with Guangzhou University. His research interests include network traffic analysis and information security.
Yi Tang received the B.S. and M.S. degrees from the Department of Mathematics, Sun Yat-sen University, in 1988 and 1991, respectively, and the Ph.D. degree from the Department of Mathematics, Sun Yat-sen University, in 2003. He is currently a Professor with Guangzhou University. His research interests include network traffic analysis and information security.View more

References

References is not available for this document.