Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain

被引:1
作者
Tian, Jing [1 ]
Zhao, Yanqi [1 ]
Yang, Xiaoyi [1 ]
Zhao, Xuan [1 ]
Chen, Ruonan [2 ]
Yu, Yong [3 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
来源
HIGH-CONFIDENCE COMPUTING | 2024年 / 4卷 / 04期
基金
中国国家自然科学基金;
关键词
Identity-based signature; Accountability; Blockchain; Threshold (multi) signature;
D O I
10.1016/j.hcc.2024.100271
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based threshold signature (IDTHS) allows a threshold number of signers to generate signatures to improve the deterministic wallet in the blockchain. However, the IDTHS scheme cannot determine the identity of malicious signers in case of misinformation. To solve this challenge, we propose an identity-based threshold (multi) signature with private accountability (for short AIDTHS) for privacypreserving blockchain. From the public perspective, AIDTHS is completely private and no user knows who participated in generating the signature. At the same time, when there is a problem with the transaction, a trace entity can trace and be accountable to the signers. We formally define the syntax and security model of AIDTHS. To address the issue of identifying malicious signers, we improve upon traditional identity-based threshold signatures by incorporating zero-knowledge proofs as part of the signature and leveraging a tracer holding tracing keys to identify all signers. Additionally, to protect the privacy of signers, the signature is no longer achievable by anyone, which requires a combiner holding the keys to produce a valid signature. We give a concrete construction of AIDTHS and prove its security. Finally, we implement the AIDTHS scheme and compare it with existing schemes. The key distribution algorithm of AIDTHS takes 34.60 mu s and the signature algorithm takes 13.04 ms. The verification algorithm takes 1 s, which is one-third of the time the TAPS scheme uses. (c) 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:11
相关论文
共 38 条
  • [21] Decentralized Threshold Signatures With Dynamically Private Accountability
    Li, Meng
    Ding, Hanni
    Wang, Qing
    Zhang, Mingwei
    Meng, Weizhi
    Zhu, Liehuang
    Zhang, Zijian
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2217 - 2230
  • [22] Ling S., 2018, IACR Cryptol. ePrint Arch., P1251
  • [23] IdenMultiSig: Identity-Based Decentralized Multi-Signature in Internet of Things
    Liu, Han
    Han, Dezhi
    Cui, Mingming
    Li, Kuan-Ching
    Souri, Alireza
    Shojafar, Mohammad
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (04) : 1711 - 1721
  • [24] PEACS: A Privacy-Enhancing and Accountable Car Sharing System
    Liu, Yulin
    He, Debiao
    Bao, Zijian
    Luo, Min
    Peng, Cong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16422 - 16435
  • [25] Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key
    Liu, Zhen
    Yang, Guomin
    Wong, Duncan S.
    Khoa Nguyen
    Wang, Huaxiong
    Ke, Xiaorong
    Liu, Yining
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2934 - 2951
  • [26] Authenticated Data Redaction With Accountability and Transparency
    Ma, Jinhua
    Huang, Xinyi
    Mu, Yi
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 149 - 160
  • [27] Micali S., 2001, CCSL 2001, P245
  • [28] Verifiable Timed Accountable Subgroup Multi-signatures
    Ozden, Duygu
    Yayla, Oguz
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 295 - 305
  • [29] Partap A., 2022, Paper 2022/1656
  • [30] Peng Wei, 2021, 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), P1005, DOI 10.1109/ICAICA52286.2021.9498100