scispace - formally typeset
Book ChapterDOI

A Post-quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy

Reads0
Chats0
TLDR
Wang et al. as mentioned in this paper proposed a post-quantum certificateless ring signature algorithm over lattice, which can hide the signer identity information and resist quantum computing attacks and effectively avoid certificate management problem and third-party central key escrow problem.
Abstract
Classical cryptography is no longer secure under quantum computing background. In traditional sharing economy, the centralized management mode leads to data tampering and privacy leakage problems. Targeting at these problems, in our paper, a novel privacy protection scheme is designed for sharing economy based on blockchain. Firstly, we propose a post-quantum certificateless ring signature algorithm over lattice, which can hide the signer’s identity information and resist quantum computing attacks. Moreover, our proposed scheme can effectively avoid certificate management problem and third-party central key escrow problem. Secondly, we use the principle of bimodal Gaussian rejection sampling to generate signature. It can reduce the sampling times in signature phase and greatly improves the signature efficiency. Notably, the signature distribution is independent of signer’s private key, which can better avoid the disclosure of signer’s private key information. Thirdly, we construct a blockchain sharing economy transaction scheme based on the proposed signature algorithm that can protect the privacy of user. Finally, security and efficiency of our scheme are analyzed that have lower storage cost and time cost than other related schemes under the random oracle model.

read more

Citations
More filters
Journal ArticleDOI

A certificateless ring signature scheme based on lattice

TL;DR: Li et al. as discussed by the authors proposed a certificateless ring signature scheme based on lattice (L•CRSS), which does not need key escrow, does not disclose the signer's identity, achieves the constant signature size, and has higher security and efficiency in the post-quantum era.
Journal ArticleDOI

A Lattice-Based Certificateless Traceable Ring Signature Scheme

TL;DR: Li et al. as mentioned in this paper proposed a lattice-based traceable ring signature (TRS) scheme to solve the certificate management problem while avoid key escrow problem, which is more practical and promising in e-voting.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Book ChapterDOI

How to prove yourself: practical solutions to identification and signature problems

TL;DR: Simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys are described.
Proceedings ArticleDOI

Trapdoors for hard lattices and new cryptographic constructions

TL;DR: In this article, the authors show how to construct a variety of "trapdoor" cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the shortest nonzero vector to within certain polynomial factors).
Book ChapterDOI

Certificateless Public Key Cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Book ChapterDOI

How to Leak a Secret

TL;DR: A new construction of ring signatures is proposed, which is unconditionally signer-ambiguous, provably secure in the random oracle model, and exceptionally efficient: adding each ring member increases the cost of signing or verifying by a single modular multiplication and a single symmetric encryption.
Related Papers (5)