期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
A Conditionally Anonymous Linkable Ring Signature for Blockchain Privacy Protection
1
作者 Quan Zhou Yulong Zheng +1 位作者 Minhui Chen Kaijun Wei 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2851-2867,共17页
In recent years,the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention.To ensure privacy protection for both sides of the transaction,many researchers are... In recent years,the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention.To ensure privacy protection for both sides of the transaction,many researchers are using ring signature technology instead of the original signature technology.However,in practice,identifying the signer of an illegal blockchain transaction once it has been placed on the chain necessitates a signature technique that offers conditional anonymity.Some illegals can conduct illegal transactions and evade the lawusing ring signatures,which offer perfect anonymity.This paper firstly constructs a conditionally anonymous linkable ring signature using the Diffie-Hellman key exchange protocol and the Elliptic Curve Discrete Logarithm,which offers a non-interactive process for finding the signer of a ring signature in a specific case.Secondly,this paper’s proposed scheme is proven correct and secure under Elliptic Curve Discrete Logarithm Assumptions.Lastly,compared to previous constructions,the scheme presented in this paper provides a non-interactive,efficient,and secure confirmation process.In addition,this paper presents the implementation of the proposed scheme on a personal computer,where the confirmation process takes only 2,16,and 24ms for ring sizes of 4,24 and 48,respectively,and the confirmation process can be combined with a smart contract on the blockchain with a tested millisecond level of running efficiency.In conclusion,the proposed scheme offers a solution to the challenge of identifying the signer of an illegal blockchain transaction,making it an essential contribution to the field. 展开更多
关键词 ring signature conditionally anonymity blockchain privacy protection
下载PDF
An Efficient Certificateless Ring Signature Scheme
2
作者 ZHU Lijun ZHANG Futai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期567-571,共5页
To overcome the drawbacks such as high computational cost, unreasonable security model and long signature length in existing certificateless ring signature schemes, we propose an efficient certificateless ring signatu... To overcome the drawbacks such as high computational cost, unreasonable security model and long signature length in existing certificateless ring signature schemes, we propose an efficient certificateless ring signature scheme in this paper. Our construction is inspired by some efficient ID-based ring signature schemes, and uses bilinear pairings as a basic tool. Using a reasonable security model, the unforgeability of the proposed scheme is proven based on the intractability of the computational Diffie-Hellman (CDH) problem. The signature length of the new scheme is only |G2|+n|G1| (|Gi| is the bit length of an element in group Gi, i =1, 2). Compared with other existing certificateless ring signature schemes, the newly proposed scheme has a shorter signature length and is more efficient and practical. 展开更多
关键词 certificateless ring signature UNFORGEABILITY bilinear pairings CDH problem
下载PDF
A RING SIGNATURE SCHEME OVER BRAID GROUPS
3
作者 Wei Yun Xiong Guohua +1 位作者 Bao Wansu Zhang Xingkai 《Journal of Electronics(China)》 2010年第4期522-527,共6页
Quantum algorithms bring great challenges to classical public key cryptosystems, which makes cryptosystems based on non-commutative algebraic systems hop topic. The braid groups, which are non-commutative, have attrac... Quantum algorithms bring great challenges to classical public key cryptosystems, which makes cryptosystems based on non-commutative algebraic systems hop topic. The braid groups, which are non-commutative, have attracted much attention as a new platform for constructing quantum attack-resistant cryptosystems. A ring signature scheme is proposed based on the difficulty of the root extraction problem over braid groups, which can resist existential forgery against the adaptively cho-sen-message attack under the random oracle model. 展开更多
关键词 Braid group ring signature Root extraction problem Random oracle model
下载PDF
Revocable Ring Signature 被引量:4
4
作者 廖忻宏 廖啟瑞 +2 位作者 穆怡 Willy Susilo 王石 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第6期785-794,共10页
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Rin... Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Ring signature, on the other hand, does not allow anyone to revoke the signer anonymity, while allowing the real signer to form a group (also known as a ring) arbitrarily without being controlled by any other party. In this paper, we propose a new variant for ring signature, called Revocable Ring Signature. The signature allows a real signer to form a ring arbitrarily while allowing a set of authorities to revoke the anonymity of the real signer. This new variant inherits the desirable properties from both group signature and ring signature in such a way that the real signer will be responsible for what it has signed as the anonymity is revocable by authorities while the real signer still has the freedom on ring formation. We provide a formal security model for revocable ring signature and propose an efficient construction which is proven secure under our security model. 展开更多
关键词 ANONYMITY group signature revocability ring signature
原文传递
An Attribute-Based Ring Signature Scheme in Lattice 被引量:2
5
作者 LI Wei FAN Mingyu JIA Zhenhong 《Wuhan University Journal of Natural Sciences》 CAS 2012年第4期297-301,共5页
An attribute-based ring signature scheme in lattice was proposed in this paper. In this signature scheme, an entity’s attributes correspond to the columns of a lattice matrix, and the signature was generated by using... An attribute-based ring signature scheme in lattice was proposed in this paper. In this signature scheme, an entity’s attributes correspond to the columns of a lattice matrix, and the signature was generated by using a subset of these attributes. The entities possessing these attributes form a ring. The scheme is computationally efficient than the schemes based on the integer factor problem and discrete logarithm problem, furthermore it is still secure in quantum computing environment. 展开更多
关键词 ring signature ATTRIBUTE Bonsai tree model LATTICE
原文传递
Practical Constant-Size Ring Signature 被引量:1
6
作者 Meng-Jun Qin Yun-Lei Zhao Zhou-Jun Ma 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第3期533-541,共9页
Bitcoin has gained its popularity for almost 10 years as a "secure and anonymous digital currency". However, according to several recent researches, we know that it can only provide pseudonymity rather than real ano... Bitcoin has gained its popularity for almost 10 years as a "secure and anonymous digital currency". However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and privacy has been one of the main concerns in the system similar to Bitcoin. Ring signature is a good method for those users who need better anonymity in cryptocurrency. It was first proposed by Rivest et al. based upon the discrete logarithm problem (DLP) assumption in 2006, which allows a user to sign a message anonymously on behalf of a group of users even without their coordination. The size of ring signature is one of the dominating parameters, and constant-size ring signature (where signature size is independent of the ring size) is much desirable. Otherwise, when the ring size is large, the resultant ring signature becomes unbearable for power limited devices or leads to heavy burden over the communication network. Though being extensively studied, currently there are only two approaches for constant-size ring signature. Achieving practical constant-size ring signature is a long-standing open problem since its introduction. In this work, we solve this open question. We present a new constant-size ring signature scheme based on bilinear pairing and accumulator, which is provably secure under the random oracle (RO) model. To the best of our knowledge, it stands for the most practical ring signature up to now. 展开更多
关键词 ring signature constant size bilinear pairing ACCUMULATOR
原文传递
Improved lattice-based ring signature schemes from basis delegation 被引量:1
7
作者 Gao Wen Hu Yupu +1 位作者 Wang Baocang Xie Jia 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第3期11-17,28,共8页
Ring signature enables the members to sign anonymously without a manager, it has many online applications, such as e-voting, e-money, whistle blowing etc. As a promising post-quantum candidate, lattice-based cryptogra... Ring signature enables the members to sign anonymously without a manager, it has many online applications, such as e-voting, e-money, whistle blowing etc. As a promising post-quantum candidate, lattice-based cryptography attracts much attention recently. Several efficient lattice-based ring signatures have been naturally constructed from lattice basis delegation, but all of them have large verification key sizes. Our observation finds that a new concept called the split- small integer solution (SIS) problem introduced by Nguyen et al. at PKC'I 5 is excellent in reducing the public key sizes of lattice-based ring signature schemes from basis delegation. In this research, we first define an extended concept called the extended split-SIS problem, and then prove that the hardness of the extended problem is as hard as the approximating shortest independent vectors problem (SIVP) problem within certain polynomial factor. Moreover, we present an improved ring signature and prove that it is anonymous and unforgeable against the insider corruption. Finally, we give two other improved existing ring signature schemes from lattices. In the end, we show the comparison with the original scheme in terms of the verification key sizes. Our research data illustrate that the public key sizes of the proposed schemes are reduced significantly. 展开更多
关键词 lattice-based ring signature scheme ANONYMOUS unforgeable
原文传递
A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies
8
作者 Ning Liu Fan Yang +2 位作者 Xi Xiong Yan Chang Shibin Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第11期1559-1570,共12页
Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system.The trust management system evaluates,manages,and shares users’trust values.The servic... Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system.The trust management system evaluates,manages,and shares users’trust values.The service provider(SP)members of the federation system rely on users’trust values to determine which type and quality of service will be provided to the users.While identity federation systems have the potential to help federated users save time and energy and improve service experience,the benefits also come with significant privacy risks.So far,there has been little discussion about the privacy protection of users in heterogeneous identity federation systems.In this paper,we propose a trust value sharing scheme based on a proxy ring signature for the trust management system in heterogeneous identity federation topologies.The ring signature schemes can ensure the validity of the data and hide the original signer,thereby protecting privacy.Moreover,no group manager participating in the ring signature,which naturally matches with our decentralized heterogeneous identity federation topologies.The proxy signature can reduce the workload of the private key owner.The proposed scheme shortens the calculation time for verifying the signature and then reduces the overall time consumption in the process of trust sharing.Our studies prove that the proposed scheme is privacy-preserving,efficient,and effective. 展开更多
关键词 Heterogeneous identity federation system proxy ring signature trust value sharing scheme
下载PDF
Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain
9
作者 Nitish Pathak Shams Tabrez Siddiqui +3 位作者 Anjani Kumar Singha Heba G Mohamed Shabana Urooj Abhinandan R Patil 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3021-3036,共16页
The coronavirus,formerly known as COVID-19,has caused massive global disasters.As a precaution,most governments imposed quarantine periods ranging from months to years and postponed significantfinancial obligations.Furt... The coronavirus,formerly known as COVID-19,has caused massive global disasters.As a precaution,most governments imposed quarantine periods ranging from months to years and postponed significantfinancial obligations.Furthermore,governments around the world have used cutting-edge technologies to track citizens’activity.Thousands of sensors were connected to IoT(Internet of Things)devices to monitor the catastrophic eruption with billions of connected devices that use these novel tools and apps,privacy and security issues regarding data transmission and memory space abound.In this study,we suggest a block-chain-based methodology for safeguarding data in the billions of devices and sen-sors connected over the internet.Various trial secrecy and safety qualities are based on cutting-edge cryptography.To evaluate the proposed model,we recom-mend using an application of the system,a Raspberry Pi single-board computer in an IoT system,a laptop,a computer,cell phones and the Ethereum smart contract platform.The models ability to ensure safety,effectiveness and a suitable budget is proved by the Gowalla dataset results. 展开更多
关键词 ring signature blockchain IOT ENCRYPTION smart contract DECRYPTION authentication PRIVACY-PRESERVING
下载PDF
Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation
10
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期183-199,共17页
Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data s... Progress in cloud computing makes group data sharing in outsourced storage a reality.People join in group and share data with each other,making team work more convenient.This new application scenario also faces data security threats,even more complex.When a user quit its group,remaining data block signatures must be re-signed to ensure security.Some researchers noticed this problem and proposed a few works to relieve computing overhead on user side.However,considering the privacy and security need of group auditing,there still lacks a comprehensive solution to implement secure group user revocation,supporting identity privacy preserving and collusion attack resistance.Aiming at this target,we construct a concrete scheme based on ring signature and smart contracts.We introduce linkable ring signature to build a kind of novel meta data for integrity proof enabling anonymous verification.And the new meta data supports secure revocation.Meanwhile,smart contracts are using for resisting possible collusion attack and malicious re-signing computation.Under the combined effectiveness of both signature method and blockchain smart contracts,our proposal supports reliable user revocation and signature re-signing,without revealing any user identity in the whole process.Security and performance analysis compared with previous works prove that the proposed scheme is feasible and efficient. 展开更多
关键词 Provable data possession data integrity blockchain ring signature
下载PDF
Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data
11
作者 Yining Qi Yubo Luo +1 位作者 Yongfeng Huang Xing Li 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2603-2618,共16页
Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,wh... Cloud storage has been widely used to team work or cooperation devel-opment.Data owners set up groups,generating and uploading their data to cloud storage,while other users in the groups download and make use of it,which is called group data sharing.As all kinds of cloud service,data group sharing also suffers from hardware/software failures and human errors.Provable Data Posses-sion(PDP)schemes are proposed to check the integrity of data stored in cloud without downloading.However,there are still some unmet needs lying in auditing group shared data.Researchers propose four issues necessary for a secure group shared data auditing:public verification,identity privacy,collusion attack resis-tance and traceability.However,none of the published work has succeeded in achieving all of these properties so far.In this paper,we propose a novel block-chain-based ring signature PDP scheme for group shared data,with an instance deployed on a cloud server.We design a linkable ring signature method called Linkable Homomorphic Authenticable Ring Signature(LHARS)to implement public anonymous auditing for group data.We also build smart contracts to resist collusion attack in group auditing.The security analysis and performance evalua-tion prove that our scheme is both secure and efficient. 展开更多
关键词 Provable data possession data integrity blockchain ring signature
下载PDF
Consensus algorithm for medical data storage and sharing based on master–slave multi-chain of alliance chain
12
作者 Yixian Zhang Feng Zhao 《High-Confidence Computing》 2023年第3期12-21,共10页
The safe storage and sharing of medical data have promoted the development of the public medical field.At the same time,blockchain technology guarantees the safe storage and sharing of medical data.However,the consens... The safe storage and sharing of medical data have promoted the development of the public medical field.At the same time,blockchain technology guarantees the safe storage and sharing of medical data.However,the consensus algorithm in the current medical blockchain cannot meet the requirements of low delay and high throughput in the large-scale network,and the identity of the primary node is exposed and vulnerable to attack.Therefore,this paper proposes an efficient consensus algorithm for medical data storage and sharing based on a master–slave multi-chain of alliance chain(ECA_MDSS).Firstly,institutional nodes in the healthcare alliance chain are clustered according to geographical location and medical system structure to form a multi-zones network.The system adopts master–slave multi-chain architecture to ensure security,and each zone processes transactions in parallel to improve consensus efficiency.Secondly,the aggregation signature is used to improve the practical Byzantine fault-tolerant(PBFT)consensus to reduce the communication interaction of consensus in each zone.Finally,an efficient ring signature is used to ensure the anonymity and privacy of the primary node in each zone and to prevent adaptive attacks.Meanwhile,a trust model is introduced to evaluate the trust degree of the node to reduce the evil done by malicious nodes.The experimental results show that ECA_MDSS can effectively reduce communication overhead and consensus delay,improve transaction throughput,and enhance system scalability. 展开更多
关键词 Alliance chain Master-slave multi-chain Consensus algorithm Aggregation signature ring signature Trust value
原文传递
An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability
13
作者 PU Guangning YIN Fengmei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第4期317-323,共7页
In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authenticati... In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication.Unconditional anonymous authentication can verify that the user belongs to an anonymous set,but the user's true identity cannot be obtained.However,in some applications,it is necessary to trace the true identity of the user.Therefore,a traceable anonymous authentication scheme is proposed.In order to prevent random tracing,the proposed scheme uses threshold joint tracing.When the identity of the authenticator needs to be traced,the threshold number of members can jointly trace the identity of the authenticator.In some special network applications such as anonymous electronic voting,in order to prevent repeated authentications and repeated elections,it is necessary to verify whether the two authentication signatures are signed by the same user without revealing the true identity of the user.Therefore,the proposed anonymous authentication scheme should have selective linkability.In order to achieve linkable authentication,the linkable tag is embedded by linkable ring signature.Compared with similar schemes through the simulation experiments,the implementation time of the proposed scheme is slightly better than other schemes. 展开更多
关键词 anonymous authentication TRACEABILITY THRESHOLD ring signature linkability
原文传递
An Efficient Identity-Based Anonymous Signcryption Scheme 被引量:4
14
作者 YU Yong LI Fagen XU Chunxiang SUN Ying 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期670-674,共5页
Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step more efficiently than sign-then-encrypt approach. Till now, various kinds of signcryption schemes have been pro... Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step more efficiently than sign-then-encrypt approach. Till now, various kinds of signcryption schemes have been proposed. Among them, the requirement of signcrypter's privacy protection is needful in some practical applications. In this paper, a new identity-based anonymous signcryption scheme from hilinear pairings, which is the organic combination of identity-based ring signature and encryption scheme, is proposed. The proposed scheme is indistinguishable against the chosen ciphertext attack under the Decisional Bilinear Diffie-Hellman assumption in the random oracle model. Its unforgeability relies on the computational Diffieellman problem. Compared with the previous schemes, the new scheme is more efficient in computation. 展开更多
关键词 IDENTITY-BASED ring signature anonynaous signcryption bilinear pairing
原文传递
EVchain: An Anonymous Blockchain-Based System for Charging–Connected Electric Vehicles 被引量:2
15
作者 Shiyuan Xu Xue Chen Yunhua He 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第6期845-856,共12页
Purchases of electric vehicles have been increasing in recent years. These vehicles differ from traditional fossil-fuel-based vehicles especially in the time consumed to keep them running. Electric-Vehicle-charging Se... Purchases of electric vehicles have been increasing in recent years. These vehicles differ from traditional fossil-fuel-based vehicles especially in the time consumed to keep them running. Electric-Vehicle-charging Service Providers(EVSPs) must arrange reasonable charging times for users in advance. Most EVSP services are based on third-party platforms, but reliance on third-party platforms creates a lack of security, leaving users vulnerable to attacks and user-privacy leakages. In this paper, we propose an anonymous blockchain-based system for charging-connected electric vehicles that eliminates third-party platforms through blockchain technology and the establishment of a multi-party security system between electric vehicles and EVSPs. In our proposed system, digital certificates are obtained by completing distributed Public Key Infrastructure(distributed-PKI) identity registration,with the user registration kept separate from the verification process, which eliminates dependence on the EVSP for information security. In the verification process, we adopt smart contracts to solve problems associated with centralized verification and opaque services. Furthermore, we utilize zero-knowledge proof and ring-signature superposition to realize completely anonymous verification, which ensures undeniability and unforgeability with no detriment to anonymity. The evaluation results show that the user anonymity, information authenticity, and system security of our system fulfill the necessary requirements. 展开更多
关键词 blockchain Electric Vehicles(EV) zero knowledge proof distributed Public Key Infrastructure(distributed-PKI) ring signature smart contract
原文传递
Extended Methodology of RS Design and Instances Based on GIP 被引量:1
16
作者 Qian-HongWu BoQin Yu-MinWang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第2期270-275,共6页
Abe et al. proposed the methodology of ring signature (RS) design in 2002 andshowed how to construct RS with a mixture of public keys based on factorization and/or discretelogarithms. Their methodology cannot be appli... Abe et al. proposed the methodology of ring signature (RS) design in 2002 andshowed how to construct RS with a mixture of public keys based on factorization and/or discretelogarithms. Their methodology cannot be applied to knowledge signatures (KS) using the Fiat-Shamirheuristic and cut-and-choose techniques, for instance, the Goldreich KS. This paper presents a moregeneral construction of RS from various public keys if there exists a secure signature using such apublic key and an efficient algorithm to forge the relation to be checked if the challenges in sucha signature are known in advance. The paper shows how to construct RS based on the graph isomorphismproblem (GIP). Although it is unknown whether or not GIP is NP-Complete, there are no knownarguments that it can be solved even in the quantum computation model. Hence, the scheme has abetter security basis and it is plausibly secure against quantum adversaries. 展开更多
关键词 ring signature knowledge signature graph isomorphism problem
原文传递
A Traceable and Anonymous Authentication Scheme Based on ECC
17
作者 YIN Fengmei HOU Zhengfeng WU Hao 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第6期521-526,共6页
Based on elliptic curve public key cryptosystem and with the help of ring signature,a traceable and anonymous authentication scheme is proposed.The security of the proposed scheme is based on the difficulty of solving... Based on elliptic curve public key cryptosystem and with the help of ring signature,a traceable and anonymous authentication scheme is proposed.The security of the proposed scheme is based on the difficulty of solving elliptic curve discrete logarithm problem(ECDLP)and the computational Diffie-Hellman assumption(CDHA).In order to prevent random tracing,the threshold technology is introduced into anonymous tracing.In addition,in the signature generation process,using the private key and the additional random number,the signature satisfies unforgeability.Compared with the existing schemes,the communication overhead of the proposed scheme is relatively small.In the case of similar calculational overhead,the proposed scheme not only has anonymous authentication,signature unforgeability,but also has threshold traceability. 展开更多
关键词 anonymous authentication TRACEABILITY THRESHOLD ECC ring signature
原文传递
Supervisable Anonymous Management of Digital Certificates for Blockchain PKI
18
作者 Shaozhuo Li Na Wang +1 位作者 Xuehui Du Xuan Li 《国际计算机前沿大会会议论文集》 2020年第1期130-144,共15页
Aiming at the requirement of anonymous supervision of digital certificates in blockchain public key infrastructure(PKI),this paper proposes a ring signature with multiple indirect verifications(RS-MIV).This mechanism ... Aiming at the requirement of anonymous supervision of digital certificates in blockchain public key infrastructure(PKI),this paper proposes a ring signature with multiple indirect verifications(RS-MIV).This mechanism can ensure multiple and indirect verification of certificate signer identity while preserving its anonymity.On this basis,a supervisable anonymous management scheme was designed based on smart contracts,which realizes the anonymity of certificate authority nodes,the anonymous issuance of digital certificates,the anonymous verification of digital certificates,and the traceability of illegal certificate issuers in the blockchain PKI.It is proved that the scheme can guarantee the anonymity and traceability of the certificate issuer’s identity at an acceptable cost. 展开更多
关键词 Blockchain Digital certificate PKI ring signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部