Abstract
In the e-commerce scenario, the signature schemes generally have to meet four requirements: public verification, integrity, traceable and efficiency. To achieve the above goals, the paper proposes a identity-based threshold group signature scheme which can not only simplify the process of key management, but also allow to trace the user identities. To protect the user privacy, the scheme blinds the user identities and stores them on the blockchain to prevent the malicious members from tampering with the content. Security analysis shows that the proposed signature, whose difficulty is equivalent to solve the discrete logarithm problem, achieves a high level of anonymity and can resist impersonation attacks. Computational complexity analysis shows that the new method with low computation overhead and high communication efficiency can be effectively adapted to the electronic commerce scene.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, T.S., Hsiao, T.C., Chen, T.L.: An efficient threshold group signature scheme. In: TENCON 2004, pp. 13–16 (2004)
Wang, L., et al.: A voting scheme in blockchain based on threshold group signature. In: Zhang, H., Zhao, B., Yan, F. (eds.) CTCIS 2018. CCIS, vol. 960, pp. 184–202. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-5913-2_12
Dong, X., Jiajia, L., Zhonghua, S.: A new threshold signature scheme based on elliptic curve cryptosystem. J. Hangzhou Normal Univ. (Nat. Sci. Ed.) 12(1), 57–60 (2013)
Yage, C., Mingsheng, H., Bei, G., Lipeng, W., Erfeng, X.: Dynamic threshold signature scheme with strong forward security. Comput. Eng. Appl. 1(23), 1–12 (2019)
Wang, L., Hu, M., Jia, Z., Gong, B., Lei, Y.: A signature scheme applying on blockchain voting scene based on asmuth-bloom algorithm. In: IEEE 4th International Conference on Computer and Communications (2018)
Hongwei, L., Weixin, X., Jianping, Y., Peng, Z.: Efficiency identity-based threshold group signature scheme. J. Commun. 30(5), 122–127 (2009)
Jie, Y., Xuri, Y., Wujun, Z.: Research on group signature with threshold value based on elliptic curve. J. Southeast Univ. (Nat. Sci. Ed.) 38(1), 43–46 (2008)
Yufang, C., Tzerlong, C., Tzer-Shyong, C., Chihsheng, C.: A study on efficient group-oriented signature schemes for realistic application environment. Int. J. Innov. Comput. Inf. Control 8(4), 2713–2727 (2012)
Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179–1194 (2018)
Yehuda, L., Nof, A.: Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1837–1854 (2018)
Gennaro, R., Goldfeder, S., Narayanan, A.: Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. In: Manulis, M., Sadeghi, A.R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 156–174. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39555-5_9
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, pp. 313–317 (1979)
Dahshan, H., Kamal, A., Rohiem, A.: A threshold blind digital signature scheme using elliptic curve dlog-based cryptosystem. In: IEEE Vehicular Technology Conference, pp. 1–5 (2015)
Lipeng, W., Mingsheng, H., Zhijuan, J., Bei, G., Jialei, Z.: A signature scheme applying on blockchain voting scene based on chinese remainder theorem. Appl. Res. Comput. 29(1), 1–8 (2018)
Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)
Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)
Yannan, L., Yong, Y., Geyong, M., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. 14(8), 72–83 (2017)
Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–559 (2013)
Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)
Wenting, S., Jing, Q., Jia, Y., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2019)
Acknowledgments
This work was supported by Henan Province Higher Education Key Research Project (20B520040).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, L. et al. (2020). Identity-Based Threshold Group Signature Scheme of Blockchain Verification. In: Han, W., Zhu, L., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2019. Communications in Computer and Information Science, vol 1149. Springer, Singapore. https://doi.org/10.1007/978-981-15-3418-8_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-3418-8_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3417-1
Online ISBN: 978-981-15-3418-8
eBook Packages: Computer ScienceComputer Science (R0)