Lattice-Based Verifiably Encrypted Signature Scheme without Gaussian Sampling for Privacy Protection in Blockchain
-
Published:2022-10-31
Issue:21
Volume:14
Page:14225
-
ISSN:2071-1050
-
Container-title:Sustainability
-
language:en
-
Short-container-title:Sustainability
Author:
Lu XiuhuaORCID,
Yin Wei,
Zhang Pingyuan
Abstract
Before the transaction data in the blockchain is successfully linked, its signature must be publicly verified by a large number of nodes in the blockchain, which is also one of the ways to leak transaction information. To alleviate the contradiction between the public verifiability of signatures and the protection of transaction privacy, we introduce a verifiably encrypted signature scheme into the blockchain. A verifiably encrypted signature scheme contains two parts of signature information: the encrypted signature is used for public verification, and the ordinary signature is used for internal verification. To reach this goal even better, we design a new lattice-based verifiably encrypted signature scheme, which separates the parameter settings of the signer and the adjudicator, and replaces the Gaussian sampling algorithm with a small range of uniform random sampling, achieving better efficiency and security.
Funder
National Cryptography Development Fund
National Natural Science Foundation of China
Shandong Social Science Planning Project
Key Research Project of Higher Education Institutions of Henan Province
Subject
Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction
Reference25 articles.
1. Asokan, N., Schunter, M., and Waidner, M. Optimistic protocols for fair exchange. Proceedings of the CCS ’97: Proceedings of the 4th ACM Conference on Computer and Communications Security.
2. Blockchain-based two-party fair contract signing scheme;Zhang;Inf. Sci.,2020
3. Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures;Seo;Int. J. Inf. Secur.,2018
4. Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management;Wang;Int. J. Inf. Secur.,2018
5. Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications;Yang;IEEE Trans. Inf. Forensics Secur.,2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献