期刊文献+

面向区块链金融的抗量子属性基门限环签密方案

Attribute-Based Anti-Quantum Threshold Ring Signcryption Scheme for Blockchain-Based Finance
下载PDF
导出
摘要 针对区块链金融系统中用户访问控制粒度较粗、交易数据流向不受控制、数据在公有链上传输时易受窃听等问题,文章提出适用于区块链金融的抗量子属性基门限环签密方案(BCF-AAQTRSC)。BCF-AAQTRSC利用多属性机构使任何用户都可创建属性并授权不同用户,在保证区块链访问控制灵活性的同时很好保护了区块链访问控制的安全性。BCF-AAQTRSC在实现中心权力分散的同时满足用户隐私数据的保密性、不可伪造性和匿名性。BCF-AAQTRSC通过NTRU格构造系统参数、主控密钥与用户私钥,使用消息块共享技术与填充排列技术构造密文,使方案的安全性和计算效率得到极大提高,适用于高存储效率的区块链金融应用场景中。 To solve the problems of coarse granularity of user access control,uncontrolled flow of transaction data,and vulnerability to eavesdropping of transmission data in public chain in blockchain finance systems,this paper proposed an attribute-based anti-quantum threshold ring signcryption Scheme for blockchain-based finance(BCFAAQTRSC).BCF-AAQTRSC improves the flexibility of blockchain access control and protects the security of blockchain access control because multi-attribute mechanism can make any user create the attributes and authorize different users.BCF-AAQTRSC satisfies the confidentiality,unforgeability,anonymity and anti-quantum security while achieving the decentralization.NTRU lattice is used to construct the system parameters,master key and user private key,BCF-AAQTRSC uses the message block sharing technology and padpermutation technology to construct the ciphertext,so its security and computation efficiency are greatly improved.BCF-AAQTRSC is suitable for blockchain-based finance application scenarios with high distribution storage efficiency.
作者 俞惠芳 乔一凡 孟茹 YU Huifang;QIAO Yifan;MENG Ru(School of Cyberspace Security,Xi’an University of Posts&Telecommunications,Xi’an 710121,China;School of Cyberspace Security,Jinan University,Guangzhou 510632,China)
出处 《信息网络安全》 CSCD 北大核心 2023年第7期44-52,共9页 Netinfo Security
基金 陕西省自然科学基础研究重点项目[2020JZ-54]。
关键词 格密码学 联盟链 门限环签密 消息块共享 隐私保护 lattice-based cryptography consortium blockchain threshold ring signcryption message block sharing privacy protection
  • 相关文献

参考文献9

二级参考文献73

  • 1Ahlswede R, Cai N, Li S Y R, et al. Network Information Flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204- 1216.
  • 2Krohn M N, Freedman M J, Mazieres D. On-the-fly Verification of Rateless Erasure Codes for Efficient Content Distribution[C] //Proc. of IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Press, 2004: 226-240.
  • 3Boneh D, Freeman D, Katz J, et al. Signing a Linear Subspace: Signature Schemes for Network Coding[C] //Proc. of 2009 Conference on Public Key Cryptography. Berlin, Germany: Springer, 2009: 68-87.
  • 4Jonathan K, Brent W. Compact Signatures for Network Coding[EB/OL]. [2010-05-11]. http://eprint.iacr.org/2008/316.
  • 5Yan Wenjie, Yang Mingxi, Li Layuan, et al. Short Signature for Multi-source Network Coding[C] //Proc. of 2009 International Conference on Multimedia Information Networking and Security. Wuhan, China: [s. n.] , 2009: 458-462.
  • 6Agrawal S, Boneh D, Boyen X, et al. Preventing Pollution Attacks in Multi-source Network Coding[C] //Proc. of 2010 Conference on Public Key Cryptography. Berlin, Germany: Springer, 2010: 161-176.
  • 7Shamir A. Identity-based cryptosystems and signature schemes [C]//Proceedings of Crypto 1984. volume 196 of LNCS, 1984: 47-53.
  • 8Boneh D, Franklin M. Identity-based encryption from the Well pairing [ C ] // Proceedings of Crypto 2001. volume 2139 of LNCS, 2001 : 213-229.
  • 9Florian Hess. Efficient identity based signature schemes based on pairings [C] // Proceedings of SAC 2002. volume 2595 of LNCS, 2002 : 310-324.
  • 10Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model[C]//Proceedings of ACISP 2006. volume 4058 of LNCS, 2006 : 207-222.

共引文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部