4.6 Article

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain

Journal

IEEE ACCESS
Volume 6, Issue -, Pages 20632-20640

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2809426

Keywords

ID-based signature; homomorphic signature; bilinear pairings; random oracle

Funding

  1. National Natural Science Foundation of China [61702125, 61472091]
  2. Scientific Research Foundation for Post-Doctoral Researchers of Guangzhou [gdbsh2016020]
  3. Natural Science Foundation of Guangdong Province for Distinguished Young Scholars [2014A030306020]
  4. Guangzhou Scholars Project for Universities of Guangzhou [1201561613]
  5. Science and Technology Planning Project of Guangdong Province, China [2015B010129015]
  6. National Natural Science Foundation for Outstanding Youth Foundation [61722203]
  7. State Key Laboratory of Cryptology, Beijing, China
  8. Program for Innovative Research Team in the Education Department of Guangdong Province [2015KCXTD014, 2016KCXTD017]

Ask authors/readers for more resources

Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certificate-based public key infrastructures and can be used to realize authentication in blockchain. Linearly homomorphic signature schemes allow to perform linear computations on authenticated data. And the correctness of the computation can be publicly verified. Although a series of homomorphic signature schemes have been designed recently, there are few homomorphic signature schemes designed in identity-based cryptography. In this paper, we construct a new ID-based linear homomorphic signature scheme, which avoids the shortcomings of the use of public-key certificates. The scheme is proved secure against existential forgery on adaptively chosen message and ID attack under the random oracle model. The ID-based linearly homomorphic signature schemes can be applied in e-business and cloud computing. Finally, we show how to apply it to realize authentication in blockchain.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available