Enhancing Copyright Protection Through Blockchain and Ring Signature Algorithm From Lattice

被引:1
作者
Jiang, Jian [1 ]
Gao, Yulong [1 ]
Li, Yile [1 ]
机构
[1] Commun Univ China, State Key Lab Media Convergence & Commun, Beijing 100024, Peoples R China
关键词
Blockchain; copyright protection; information security; cryptography; ring signature; PRIVACY;
D O I
10.1109/ACCESS.2024.3376385
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Applying blockchain to copyright protection is currently a popular research trend. However, the characteristics of blockchain open data also lead to the threat of copyright privacy leakage. Targeting at this issue, we design a secure digital copyright protection scheme based on blockchain and ring signature algorithm, which can achieve privacy protection of copyright information and improve the efficiency of data authentication. In this paper, we design a new ring signature scheme based on lattice. In this scheme, by using the lattice basis delegation algorithm, user's public-private key pair is generated without expanding the dimension of lattice. Subsequently, according to the rejection sampling, message is signed by signer's secret keys and other ring participants' public keys. It can reduce scheme's computational complexity. Finally, by combining ring signatures with blockchain technology, a new copyright protection scheme is proposed. More importantly, this scheme is proven to be secure with its correctness and anonymity. Meanwhile, it has less communication costs and shorter key sizes than those in other similar schemes. The results show that the proposed new scheme has good performance and efficiency.
引用
收藏
页码:41247 / 41254
页数:8
相关论文
共 40 条
  • [1] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
  • [2] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
  • [3] Ajtai M, 1999, AUTOMATA LANGUAGES P, P11
  • [4] Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Yuen, Tsz Hon
    [J]. THEORETICAL COMPUTER SCIENCE, 2013, 469 : 1 - 14
  • [5] Aurora: Transparent Succinct Arguments for R1CS
    Ben-Sasson, Eli
    Chiesa, Alessandro
    Riabzev, Michael
    Spooner, Nicholas
    Virza, Madars
    Ward, Nicholas P.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 : 103 - 128
  • [6] Ligero plus plus : A New Optimized Sublinear IOP
    Bhadauria, Rishabh
    Fang, Zhiyong
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Xie, Tiancheng
    Zhang, Yupeng
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 2025 - 2038
  • [7] Bresson J., 2002, P ANN INT CRYPT C SA, P18
  • [8] Usage of Deep Learning and Blockchain in Compilation and Copyright Protection of Digital Music
    Cai, Zhini
    [J]. IEEE ACCESS, 2020, 8 (08): : 164144 - 164154
  • [9] Bonsai Trees, or How to Delegate a Lattice Basis
    Cash, David
    Hofheinz, Dennis
    Kiltz, Eike
    Peikert, Chris
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (04) : 601 - 639
  • [10] Chow S. S. M., 2005, P 3 INT C NEW YORK N, P7