期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Efficient Certificateless Aggregate Signature Scheme 被引量:2
1
作者 Yu-Chi Chen Gwoboa Homg +2 位作者 Chao-Liang Liu Yuan-Yu Tsa Chi-Shiang Chan 《Journal of Electronic Science and Technology》 CAS 2012年第3期209-214,共6页
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before f... In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before forwarding or sending these messages, then the verifier must spend a lot of computing time to verify their signatures. Consequently, the aggregate signature scheme is an effective method of improving efficiency in this kind of systems, which provides the convenience for the verifier. In this paper, we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification. This scheme is provably secure under the extended computational Diffie-Hellman assumption. 展开更多
关键词 aggregate signature certificatelessaggregate signature certificateless cryptography digitalsignature.
下载PDF
An Efficient Certificateless Aggregate Signature Scheme Designed for VANET 被引量:2
2
作者 Cui Li Gang Wu +2 位作者 Lipeng Xing Feng Zhu Liang Zhao 《Computers, Materials & Continua》 SCIE EI 2020年第5期725-742,共18页
The Vehicular Ad-hoc Network(VANET)is the fundamental of smart transportation system in the future,but the security of the communication between vehicles and vehicles,between vehicles and roadside infrastructures have... The Vehicular Ad-hoc Network(VANET)is the fundamental of smart transportation system in the future,but the security of the communication between vehicles and vehicles,between vehicles and roadside infrastructures have become increasingly prominent.Certificateless aggregate signature protocol is used to address this security issue,but the existing schemes still have many drawbacks in terms of security and efficiency:First,many schemes are not secure,and signatures can be forged by the attacker;Second,even if some scheme are secure,many schemes use a large number of bilinear pairing operation,and the computation overhead is large.At the same time,the length of the aggregated signature also increases linearly with the increase of user numbers,resulting in a large communication overhead.In order to overcome the above challenges,we propose a new certificateless aggregate signature scheme for VANET,and prove the security of the scheme under the random oracle model.The new scheme uses pseudonym to realize the conditional privacy protection of the vehicle’s information.The new scheme does not use bilinear pairing operation,and the calculation efficiency is high.At the same time,the length of the aggregate signature of the new scheme is constant,thereby greatly reducing the communication and storage overhead.The analysis results demonstrate that the new scheme is not only safer,but also superior in performance to the recent related schemes in computation overhead and communication cost. 展开更多
关键词 Vehicular Ad-hoc network certificateless cryptography aggregate signature random oracle model
下载PDF
A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation 被引量:1
3
作者 Yong-Woon Hwang Im-Yeong Lee 《Computers, Materials & Continua》 SCIE EI 2021年第11期1747-1764,共18页
Recently,with the advancement of Information and Communications Technology(ICT),Internet of Things(IoT)has been connected to the cloud and used in industrial sectors,medical environments,and smart grids.However,if dat... Recently,with the advancement of Information and Communications Technology(ICT),Internet of Things(IoT)has been connected to the cloud and used in industrial sectors,medical environments,and smart grids.However,if data is transmitted in plain text when collecting data in an IoTcloud environment,it can be exposed to various security threats such as replay attacks and data forgery.Thus,digital signatures are required.Data integrity is ensured when a user(or a device)transmits data using a signature.In addition,the concept of data aggregation is important to efficiently collect data transmitted from multiple users(or a devices)in an industrial IoT environment.However,signatures based on pairing during aggregation compromise efficiency as the number of signatories increases.Aggregate signature methods(e.g.,identity-based and certificateless cryptography)have been studied.Both methods pose key escrow and key distribution problems.In order to solve these problems,the use of aggregate signatures in certificate-based cryptography is being studied,and studies to satisfy the prevention of forgery of signatures and other security problems are being conducted.In this paper,we propose a new lightweight signature scheme that uses a certificate-based aggregate signature and can generate and verify signed messages from IoT devices in an IoT-cloud environment.In this proposed method,by providing key insulation,security threats that occur when keys are exposed due to physical attacks such as side channels can be solved.This can be applied to create an environment in which data is collected safely and efficiently in IoT-cloud is environments. 展开更多
关键词 Internet of things certificate-based aggregate signature key insulation cloud LIGHTWEIGHT physical attack
下载PDF
Trusted Blockchain Oracle Scheme Based on Aggregate Signature 被引量:2
4
作者 Xiaodong Liu Jun Feng 《Journal of Computer and Communications》 2021年第3期95-109,共15页
With the development of blockchain technology, more and more applications need out-of-chain data. Thus, blockchain oracles have become an important bridge for transferring data on and off the chain. This paper studies... With the development of blockchain technology, more and more applications need out-of-chain data. Thus, blockchain oracles have become an important bridge for transferring data on and off the chain. This paper studies the mainstream blockchain oracles scheme, summarizes the shortcomings of the existing schemes and proposes a new blockchain oracle scheme based on BLS<span> </span><span>(Bohen-Lynn-Shacham) aggregation signature to ensure that off-chain data can be transferred into the blockchain in a trusted and reliable way. Specifically, the scheme uses multiple blockchain oracles to avoid the single point of failure or even a small number of malicious oracles, and improve the credibility of data. At the same time, it not only uses BLS aggregate signature to reduce the storage cost and communication overhead, but also uses commitment mechanisms to ensure the reliability and authenticity of the data. Besides, the simulation results show that the scheme can meet the practical application requirements.</span> 展开更多
关键词 Blockchain Blockchain Oracle aggregate signature BLS signature
下载PDF
Code-based Sequential Aggregate Signature Scheme
5
作者 Bennian Dou Lei Xu +2 位作者 Xiaoling Yu LinMei Cong Zuo 《Computers, Materials & Continua》 SCIE EI 2022年第12期5219-5231,共13页
This paper proposes the first code-based quantum immune sequential aggregate signature(SAS)scheme and proves the security of the proposed scheme in the random oracle model.Aggregate signature(AS)schemes and sequential... This paper proposes the first code-based quantum immune sequential aggregate signature(SAS)scheme and proves the security of the proposed scheme in the random oracle model.Aggregate signature(AS)schemes and sequential aggregate signature schemes allow a group of potential signers to sign different messages respectively,and all the signatures of those users on those messages can be aggregated into a single signature such that the size of the aggregate signature is much smaller than the total size of all individual signatures.Because of the aggregation of many signatures into a single short signature,AS and SAS schemes can reduce bandwidth and save storage;moreover,when a SAS is verified,not only the valid but also the order in which each signer signed can be verified.AS and SAS schemes can be applied to traffic control,banking transaction and military applications.Most of the existing AS and SAS schemes are based either on pairing or Rivest-Shamir-Adleman(RSA),and hence,can be broken by Shor’s quantum algorithm for Integer Factoring Problem(IFP)and Discrete Logarithm Problem(DLP).There are no quantum algorithms to solve syndrome decoding problems.Hence,code-based cryptography is seen as one of the promising candidates for post-quantum cryptography.This paper shows how to construct quantum immune sequential aggregate signatures based on coding theory.Specifically,we construct our scheme with the first code based signature scheme proposed by Courtois,Finiasz and Sendrier(CFS).Compared to the CFS signature scheme without aggregation,the proposed sequential aggregate signature scheme can save about 90%storage when the number of signers is asymptotically large. 展开更多
关键词 Sequential aggregate signature CFS signature post-quantum cryptography
下载PDF
APPLICATION OF ID-BASED AGGREGATE SIGNATURE IN MANETS
6
作者 Li Yifan Chen Huiyan 《Journal of Electronics(China)》 2010年第4期516-521,共6页
Aggregate signatures are a useful primitive which allows aggregating many signatures on different messages computed by different users into a single and constant-length signature and adapts to Mobile Ad hoc NETwork (M... Aggregate signatures are a useful primitive which allows aggregating many signatures on different messages computed by different users into a single and constant-length signature and adapts to Mobile Ad hoc NETwork (MANETs) very much. Jumin Song, et al. presented an ID-based aggregate signature, applied it to MANETs and proposed a secure routing scheme. In this work, we analyze Jumin Song, et al.’s aggregate signature scheme and find some limitations on its batch verification. In addition, in this work, we apply Craig Gentry, et al.’s ID-based aggregate signature to on-demand routing pro-tocol to present a secure routing scheme. Our scheme not only provides sound authentication and a secure routing protocol in ad hoc networks, but also meets the nature of MANETs. 展开更多
关键词 Ad hoc networks aggregate signature Security routing scheme
下载PDF
EIAS:An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack 被引量:1
7
作者 Yong Xie Fang Xu +3 位作者 Xiang Li Songsong Zhang Xiaodan Zhang Muhammad Israr 《Computers, Materials & Continua》 SCIE EI 2019年第6期903-924,共22页
Wireless sensor networks(WSNs)are the major contributors to big data acquisition.The authenticity and integrity of the data are two most important basic requirements for various services based on big data.Data aggrega... Wireless sensor networks(WSNs)are the major contributors to big data acquisition.The authenticity and integrity of the data are two most important basic requirements for various services based on big data.Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs.However,the process of data acquisitions in WSNs are in open environments,data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence,such as coalition attack.Aimed to provide data authenticity and integrity protection for WSNs,an efficient and secure identity-based aggregate signature scheme(EIAS)is proposed in this paper.Rigorous security proof shows that our proposed scheme can be secure against all kinds of attacks.The performance comparisons shows EIAS has clear advantages in term of computation cost and communication cost when compared with similar data aggregation scheme for WSNs. 展开更多
关键词 Wireless sensor networks(WSNs) big data signature aggregation efficiency coalition attack
下载PDF
Design of improved PBFT algorithm based on aggregate signature and node reputation
8
作者 Jinhua Fu Wenhui Zhou Jie Xu 《Intelligent and Converged Networks》 EI 2023年第2期158-167,共10页
The alliance chain system is a distributed ledger system based on blockchain technology,which can realize data sharing and collaboration among multiple parties while ensuring data security and reliability.The Practica... The alliance chain system is a distributed ledger system based on blockchain technology,which can realize data sharing and collaboration among multiple parties while ensuring data security and reliability.The Practical Byzantine Fault Tolerance(PBFT)consensus algorithm is the most popular consensus protocol in the alliance chain,but the algorithm has problems such as high complexity and too simple election of the master node,which will make PBFT unable to be applied in scenarios with too many nodes.At the same time,there are certain security issues.In order to solve these problems,this paper proposes an improved Byzantine consensus algorithm,Polymerization Signature and Reputation Value PBFT(P-V PBFT).Firstly,the consistency protocol process is improved based on the aggregate signature technology.The simulation results show that the P-V PBFT algorithm can effectively reduce the overhead of network transmission,and the time complexity of the algorithm decreases exponentially,which improves the efficiency of the consensus process.Secondly,the node reputation election mechanism is introduced to elect the primary node,and the security analysis is carried out to verify the fairness and security of the primary node election of the P-V PBFT algorithm.Therefore,as a feasible improvement of the blockchain consensus protocol,the P-V PBFT algorithm can provide more efficient and secure guarantee for the blockchain system in practical application. 展开更多
关键词 blockchain Practical Byzantine Fault Tolerance(PBFT) consensus mechanism aggregate signature CRYPTOGRAPHY
原文传递
An Efficient Certificateless Aggregate Signature Scheme 被引量:4
9
作者 KANG Baoyuan WANG Mu JING Dongya 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期165-170,共6页
Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificate... Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its security. The new scheme is proved secure against the two representative types adversaries in certificateless aggregate signature under the assumption that computational Diffie-Hellman problem is hard. Furthermore, from the comparison of the computation cost of the new scheme with some existing certificateless aggregate signature schemes in group sum computation, scalar multiplication computation, Hash computation and abilinear pairings computation, it concludes that the new scheme reduces the computation cost in scalar multiplication computation in half and maintains the same in the other computation costs. 展开更多
关键词 digital signature aggregate signature certificateless aggregate signature SECURITY bilinear maps
原文传递
Lattice-based sequential aggregate signatures with lazy verification 被引量:4
10
作者 Zhang Yanhua Hu Yupu +1 位作者 Jiang Mingming Xue Lili 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2015年第6期36-44,共9页
This paper proposes the first lattice-based sequential aggregate signature (SAS) scheme with lazy verification that is provably secure in the random oracle model. As opposed to large integer factoring and discrete l... This paper proposes the first lattice-based sequential aggregate signature (SAS) scheme with lazy verification that is provably secure in the random oracle model. As opposed to large integer factoring and discrete logarithm based systems, the security of the construction relies on worst-case lattice problem, namely, under the small integer solution (SIS) assumption. Generally speaking, SAS schemes enable any group of signers ordered in a chain to sequentially combine their signatures such that the size of the aggregate signature is much smaller than the total size of all individual signatures. Unlike prior such proposals, the new scheme does not require a signer to retrieve the keys of other signers and verify the aggregate-so-far before adding its own signature, and the signer can add its own signature to an unverified aggregate and forward it along immediately, postponing verification until load permits or the necessary public keys are obtained. Indeed, the new scheme does not even require a signer to know the public keys of other signers. 展开更多
关键词 sequential aggregate signatures lattice-based cryptography lazy verification small integer solution
原文传递
Attack on an Efficient Certificateless Aggregate Signature without Pairing 被引量:1
11
作者 LI Huimin LIANG Hongmei +1 位作者 WANG Haimin ZHANG Jinhui 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第2期139-145,共7页
A Certificateless Aggregate Signature(CLAS) scheme was proposed by Qu and Mu recently, which was published in "Int J. Electronic Security and Digital Forensics, 2018, 10(2)". They used discrete logarithm to ... A Certificateless Aggregate Signature(CLAS) scheme was proposed by Qu and Mu recently, which was published in "Int J. Electronic Security and Digital Forensics, 2018, 10(2)". They used discrete logarithm to ensure the scheme's security. However,we show by formulating an attack that their CLAS scheme cannot defend against Type I adversary. Furthermore, we point out an error that exists in the signature simulation of their security proof.After that we give a correct signature simulation for the security proof. Finally, to resist the Type I attack, we present two methods for improving Qu et al's CLAS scheme. Moreover, the second improving method can elevate the trust level of Qu et al's CLAS scheme to the highest trust level: Level 3. 展开更多
关键词 CERTIFICATELESS aggregate signature ATTACK SECURITY random oracle model discrete logarithm problem
原文传递
Key-insulated aggregate signature 被引量:1
12
作者 Huiyan ZHAO Jia YU +2 位作者 Shaoxia DUAN Xiangguo CHENG Rong HAO 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第5期837-846,共10页
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulate... In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulated aggregate signature. We also construct a concrete key-insulated aggre- gate signature scheme that meets our definition. Our scheme has the properties of efficient verification and short signature length. We prove the security of our scheme in the random oracle model under the computation Diffie-Hellman assump- tion. 展开更多
关键词 aggregate signature key-insulated aggregatesignature provable security bilinear pairings
原文传递
Forward-Secure Digital Signature Scheme with Tamper Evidence
13
作者 JIANG Han XU Qiuliang LIN Fengbo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期582-586,共5页
Based on the definition of tamper evidence, the authors define a new notion of tamper evidence forward secure signature scheme (TE-FSig), and propose a general method to build a TE-FSig scheme. Based on this method,... Based on the definition of tamper evidence, the authors define a new notion of tamper evidence forward secure signature scheme (TE-FSig), and propose a general method to build a TE-FSig scheme. Based on this method, they also give out a concrete instance. A TE-FSig scheme is constructed by the standard signature scheme, forward secures signature scheme and the aggregate signature scheme. It has an additional property of tamper evidence besides the property of forward secure, which can detect the time period when the key is exposed. In the standard model, the scheme constructed in the paper is proved to satisfy the prop- erties of forward secure, strong forward tamper-evidence secure, and strongly unforgeable under the chosen-message attack. 展开更多
关键词 tamper evidence forward secure bilinear map aggregate signature strongly unforgeable strong forward tamper-evidence secure
下载PDF
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain 被引量:1
14
作者 Zhiji Li 《Journal of Information Security》 2022年第2期43-65,共23页
Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the informatio... Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the information of the entire credential to the verifier, resulting in unnecessary overexposure of personal information. From the perspective of user privacy, this paper proposed a verifiable credential scheme with selective disclosure based on BLS (Bohen- Lynn-Shacham) aggregate signature. Instead of signing the credentials, we sign the claims in the credentials. When the user needs to present the credential to verifier, the user can select a part of but not all claims to be presented. To reduce the number of signatures of claims after selective disclosure, BLS aggregate signature is achieved to aggregate signatures of claims into one signature. In addition, our scheme also supports the aggregation of credentials from different users. As a result, verifier only needs to verify one signature in the credential to achieve the purpose of batch verification of credentials. We analyze the security of our aggregate signature scheme, which can effectively resist aggregate signature forgery attack and credential theft attack. The simulation results show that our selective disclosure scheme based on BLS aggregate signature is acceptable in terms of verification efficiency, and can reduce the storage cost and communication overhead. As a result, our scheme is suitable for blockchain, which is strict on bandwidth and storage overhead. 展开更多
关键词 Verifiable Credential aggregate signatures Privacy Protection Selective Disclosure Blockchain
下载PDF
Designing efficient proxy signature schemes for mobile communication 被引量:9
15
作者 LU RongXing DONG XiaoLei CAO ZhenFu 《Science in China(Series F)》 2008年第2期183-195,共13页
Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the ... Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the efficiency view, many proposed proxy signature schemes in these literatures are not satisfying and cannot fit to the mobile communication. Therefore, there is a desire to design efficient proxy signature schemes. Based on Boneh et al's pairing-based short signature, this paper presents two proxy signature schemes. One is proxy-protected signature scheme, and the other is proxy aggregate signature scheme. Since both of them can achieve high efficiency, it is believed that they are specially suitable for mobile communication environment. 展开更多
关键词 proxy signature proxy protected signature proxy aggregate signature bilinear pairings provable secure efficiency
原文传递
Consensus algorithm for medical data storage and sharing based on master–slave multi-chain of alliance chain
16
作者 Yixian Zhang Feng Zhao 《High-Confidence Computing》 2023年第3期12-21,共10页
The safe storage and sharing of medical data have promoted the development of the public medical field.At the same time,blockchain technology guarantees the safe storage and sharing of medical data.However,the consens... The safe storage and sharing of medical data have promoted the development of the public medical field.At the same time,blockchain technology guarantees the safe storage and sharing of medical data.However,the consensus algorithm in the current medical blockchain cannot meet the requirements of low delay and high throughput in the large-scale network,and the identity of the primary node is exposed and vulnerable to attack.Therefore,this paper proposes an efficient consensus algorithm for medical data storage and sharing based on a master–slave multi-chain of alliance chain(ECA_MDSS).Firstly,institutional nodes in the healthcare alliance chain are clustered according to geographical location and medical system structure to form a multi-zones network.The system adopts master–slave multi-chain architecture to ensure security,and each zone processes transactions in parallel to improve consensus efficiency.Secondly,the aggregation signature is used to improve the practical Byzantine fault-tolerant(PBFT)consensus to reduce the communication interaction of consensus in each zone.Finally,an efficient ring signature is used to ensure the anonymity and privacy of the primary node in each zone and to prevent adaptive attacks.Meanwhile,a trust model is introduced to evaluate the trust degree of the node to reduce the evil done by malicious nodes.The experimental results show that ECA_MDSS can effectively reduce communication overhead and consensus delay,improve transaction throughput,and enhance system scalability. 展开更多
关键词 Alliance chain Master-slave multi-chain Consensus algorithm Aggregation signature Ring signature Trust value
原文传递
NaEPASC:a novel and efficient public auditing scheme for cloud data 被引量:2
17
作者 Shuang TAN Yan JIA 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2014年第9期794-804,共11页
Cloud computing is deemed the next-generation information technology(IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applications wit... Cloud computing is deemed the next-generation information technology(IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applications with high quality guaranteed. However, cloud users no longer possess their data in a local data storage infrastructure,which would result in auditing for the integrity of outsourced data being a challenging problem, especially for users with constrained computing resources. Therefore, how to help the users complete the verification of the integrity of the outsourced data has become a key issue. Public verification is a critical technique to solve this problem, from which the users can resort to a third-party auditor(TPA) to check the integrity of outsourced data. Moreover,an identity-based(ID-based) public key cryptosystem would be an efficient key management scheme for certificatebased public key setting. In this paper, we combine ID-based aggregate signature and public verification to construct the protocol of provable data integrity. With the proposed mechanism, the TPA not only verifies the integrity of outsourced data on behalf of cloud users, but also alleviates the burden of checking tasks with the help of users' identity. Compared to previous research, the proposed scheme greatly reduces the time of auditing a single task on the TPA side. Security analysis and performance evaluation results show the high efficiency and security of the proposed scheme. 展开更多
关键词 Cloud storage Public verification Identity-based aggregate signature
原文传递
Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud
18
作者 GAO Ziyuan WANG Baocang +2 位作者 LIU Hequn LU Ke ZHAN Yu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期120-128,共9页
As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important ... As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important to allow the user to verify the query results returned by the cloud server. So far, tremendous efforts have been carried out to study secure outsourcing computing. The existing scheme supports that the user can detect the correctness and completeness of the query results even if the cloud server returns an empty set. However, since the data owner performs the database encryption operations and uploads the encrypted database to the cloud server, they require the user to request the data owner to decrypt the query results. In this paper, we propose a new scheme, which can accurately verify the search results. Meanwhile, the users can decrypt the query results independently. Furthermore, the proposed scheme supports a large number of data owners to upload their encrypted database to the cloud server, and it can efficiently verify the query results. Besides, we can prove that our proposed solution can achieve the desired security properties. 展开更多
关键词 outsourcing computing verifiable auditing proxyre-encryption bilinear aggregate signature
原文传递
Authentication scheme for industrial Internet of things based on DAG blockchain
19
作者 Tang Fei Dong Kun +1 位作者 Ye Zhangtao Ling Guowei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第6期1-12,共12页
Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks u... Internet of things(IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things(IIoT) system lacks unified product data sharing services. Blockchain technology based on the directed acyclic graph(DAG) structure is more suitable for high concurrency environments. But due to its distributed architecture foundation, direct storage of product data will cause authentication problems in data management. In response, IIoT based on DAG blockchain is proposed in this paper, which can provide efficient data management for product data stored on DAG blockchain, and an authentication scheme suitable for this structure is given. The security of the scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai and Wolf(LRSW) who also show that it holds for generic groups. The sequential aggregation signature scheme is more secure and efficient, and the new scheme is safe in theory and it is more efficient in engineering. 展开更多
关键词 industrial Internet of things(IIoT) blockchain directed acyclic graph(DAG) aggregation signature
原文传递
Adrestus:Secure,scalable blockchain technology in a decentralized ledger via zones
20
作者 Panagiotis Drakatos Eleni Koutrouli Aphrodite Tsalgatidou 《Blockchain(Research and Applications)》 2022年第4期56-80,共25页
Nowadays,an increasing number of blockchain architectures provide well-promising protocols for pseudonymous online payments via proposed cryptocurrencies.Most of them suffer from a number of extensibility and scalabil... Nowadays,an increasing number of blockchain architectures provide well-promising protocols for pseudonymous online payments via proposed cryptocurrencies.Most of them suffer from a number of extensibility and scalability issues,as their capacity regarding the number of transactions they are capable of processing per second is limited.Security is also a challenge for this kind of architectures.This paper presents the design and implementation of the Adrestus system,a blockchain-based transaction system with a novel consensus mechanism that is able to tolerate Byzantine faults and is designed to scale without compromising system security.One of the main components of the Adrestus design is a consistent hashing mechanism for the efficient assignment of transactions on parallel regions,called zones,and for solving load balancing problems.We claim that the Adrestus blockchain system scales linearly without compromising system security and achieves its goals without introducing the unnecessary overhead and by eliminating energy and computational waste.Preliminary theoretical simulations and results reflect that Adrestus exceeds the average throughput of the most well-known cryptocurrencies like Bitcoin,and thus,it achieves a higher performance.In this paper,we present this proposed approach along with simulation results and examine the conditions for the proposed fault-tolerant system to meet safety and liveness. 展开更多
关键词 Blockchain Consensus protocol Byzantine fault tolerance SCALABILITY Distributed systems aggregated signatures
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部