Skip to main content

Identity-Based Threshold Group Signature Scheme of Blockchain Verification

  • Conference paper
  • First Online:
Book cover Trusted Computing and Information Security (CTCIS 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1149))

Included in the following conference series:

Abstract

In the e-commerce scenario, the signature schemes generally have to meet four requirements: public verification, integrity, traceable and efficiency. To achieve the above goals, the paper proposes a identity-based threshold group signature scheme which can not only simplify the process of key management, but also allow to trace the user identities. To protect the user privacy, the scheme blinds the user identities and stores them on the blockchain to prevent the malicious members from tampering with the content. Security analysis shows that the proposed signature, whose difficulty is equivalent to solve the discrete logarithm problem, achieves a high level of anonymity and can resist impersonation attacks. Computational complexity analysis shows that the new method with low computation overhead and high communication efficiency can be effectively adapted to the electronic commerce scene.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, T.S., Hsiao, T.C., Chen, T.L.: An efficient threshold group signature scheme. In: TENCON 2004, pp. 13–16 (2004)

    Google Scholar 

  2. Wang, L., et al.: A voting scheme in blockchain based on threshold group signature. In: Zhang, H., Zhao, B., Yan, F. (eds.) CTCIS 2018. CCIS, vol. 960, pp. 184–202. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-5913-2_12

    Chapter  Google Scholar 

  3. Dong, X., Jiajia, L., Zhonghua, S.: A new threshold signature scheme based on elliptic curve cryptosystem. J. Hangzhou Normal Univ. (Nat. Sci. Ed.) 12(1), 57–60 (2013)

    Google Scholar 

  4. Yage, C., Mingsheng, H., Bei, G., Lipeng, W., Erfeng, X.: Dynamic threshold signature scheme with strong forward security. Comput. Eng. Appl. 1(23), 1–12 (2019)

    Google Scholar 

  5. Wang, L., Hu, M., Jia, Z., Gong, B., Lei, Y.: A signature scheme applying on blockchain voting scene based on asmuth-bloom algorithm. In: IEEE 4th International Conference on Computer and Communications (2018)

    Google Scholar 

  6. Hongwei, L., Weixin, X., Jianping, Y., Peng, Z.: Efficiency identity-based threshold group signature scheme. J. Commun. 30(5), 122–127 (2009)

    Google Scholar 

  7. Jie, Y., Xuri, Y., Wujun, Z.: Research on group signature with threshold value based on elliptic curve. J. Southeast Univ. (Nat. Sci. Ed.) 38(1), 43–46 (2008)

    Google Scholar 

  8. Yufang, C., Tzerlong, C., Tzer-Shyong, C., Chihsheng, C.: A study on efficient group-oriented signature schemes for realistic application environment. Int. J. Innov. Comput. Inf. Control 8(4), 2713–2727 (2012)

    Google Scholar 

  9. Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179–1194 (2018)

    Google Scholar 

  10. Yehuda, L., Nof, A.: Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1837–1854 (2018)

    Google Scholar 

  11. Gennaro, R., Goldfeder, S., Narayanan, A.: Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. In: Manulis, M., Sadeghi, A.R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 156–174. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39555-5_9

    Chapter  Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  13. Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, pp. 313–317 (1979)

    Google Scholar 

  14. Dahshan, H., Kamal, A., Rohiem, A.: A threshold blind digital signature scheme using elliptic curve dlog-based cryptosystem. In: IEEE Vehicular Technology Conference, pp. 1–5 (2015)

    Google Scholar 

  15. Lipeng, W., Mingsheng, H., Zhijuan, J., Bei, G., Jialei, Z.: A signature scheme applying on blockchain voting scene based on chinese remainder theorem. Appl. Res. Comput. 29(1), 1–8 (2018)

    Google Scholar 

  16. Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)

    Article  MathSciNet  Google Scholar 

  17. Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)

    Article  Google Scholar 

  18. Yannan, L., Yong, Y., Geyong, M., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. 14(8), 72–83 (2017)

    Google Scholar 

  19. Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–559 (2013)

    Article  Google Scholar 

  20. Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)

    Article  Google Scholar 

  21. Wenting, S., Jing, Q., Jia, Y., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2019)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Henan Province Higher Education Key Research Project (20B520040).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lipeng Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, L. et al. (2020). Identity-Based Threshold Group Signature Scheme of Blockchain Verification. In: Han, W., Zhu, L., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2019. Communications in Computer and Information Science, vol 1149. Springer, Singapore. https://doi.org/10.1007/978-981-15-3418-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3418-8_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3417-1

  • Online ISBN: 978-981-15-3418-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics