With the emergence of illegal behaviors such as money laundering and extortion,the regulation of privacy-preserving cryptocurrency has become increasingly important.However,existing regulated privacy-preserving crypto...With the emergence of illegal behaviors such as money laundering and extortion,the regulation of privacy-preserving cryptocurrency has become increasingly important.However,existing regulated privacy-preserving cryptocurrencies usually rely on a single regulator,which seriously threatens users’privacy once the regulator is corrupt.To address this issue,we propose a linkable group signature against malicious regulators(ALGS)for regulated privacy-preserving cryptocurrencies.Specifically,a set of regulators work together to regulate users’behavior during cryptocurrencies transactions.Even if a certain number of regulators are corrupted,our scheme still ensures the identity security of a legal user.Meanwhile,our scheme can prevent double-spending during cryptocurrency transactions.We first propose the model of ALGS and define its security properties.Then,we present a concrete construction of ALGS,which provides CCA-2 anonymity,traceability,non-frameability,and linkability.We finally evaluate our ALGS scheme and report its advantages by comparing other schemes.The implementation result shows that the runtime of our signature algorithm is reduced by 17%compared to Emura et al.(2017)and 49%compared to KSS19(Krenn et al.2019),while the verification time is reduced by 31%compared to Emura et al.and 47%compared to KSS19.展开更多
To prevent misuse of privacy,numerous anonymous authentication schemes with linkability and/or traceability have been proposed to ensure different types of accountabilities.Previous schemes cannot simultaneously achie...To prevent misuse of privacy,numerous anonymous authentication schemes with linkability and/or traceability have been proposed to ensure different types of accountabilities.Previous schemes cannot simultaneously achieve public linking and tracing while holding access control,therefore,a new tool named linkable and traceable anonymous authentication with fine-grained access control(LTAA-FGAC)is offered,which is designed to satisfy:(i)access control,i.e.,only authorized users who meet a designated authentication policy are approved to authenticate messages;(ii)public linkability,i.e.,anyone can tell whether two authentications with respect to a common identifier are created by an identical user;(iii)public traceability,i.e.,everyone has the ability to deduce a double-authentication user’s identity from two linked authentications without the help of other parties.We formally define the basic security requirements for the new tool,and also give a generic construction so as to satisfy these requirements.Then,we present a formal security proof and an implementation of our proposed LTAA-FGAC scheme.展开更多
In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authenticati...In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication.Unconditional anonymous authentication can verify that the user belongs to an anonymous set,but the user's true identity cannot be obtained.However,in some applications,it is necessary to trace the true identity of the user.Therefore,a traceable anonymous authentication scheme is proposed.In order to prevent random tracing,the proposed scheme uses threshold joint tracing.When the identity of the authenticator needs to be traced,the threshold number of members can jointly trace the identity of the authenticator.In some special network applications such as anonymous electronic voting,in order to prevent repeated authentications and repeated elections,it is necessary to verify whether the two authentication signatures are signed by the same user without revealing the true identity of the user.Therefore,the proposed anonymous authentication scheme should have selective linkability.In order to achieve linkable authentication,the linkable tag is embedded by linkable ring signature.Compared with similar schemes through the simulation experiments,the implementation time of the proposed scheme is slightly better than other schemes.展开更多
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hel...Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.展开更多
基金supported by the National Key R&D Program of China(2022YFB2701500)the National Natural Science Foundation of China(62272385,62202375)+4 种基金Shaanxi Distinguished Youth Project(2022JC-47)the Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Research(ZR2022ZD03)the Key Research and Development Program of Shaanxi(2024GX-ZDCYL-01-09,2024GX-ZDCYL-01-15)Young Talent Fund of Association for Science and Technology in Shaanxi,China(20220134)The Youth Innovation Team of Shaanxi Universities(24JP180).
文摘With the emergence of illegal behaviors such as money laundering and extortion,the regulation of privacy-preserving cryptocurrency has become increasingly important.However,existing regulated privacy-preserving cryptocurrencies usually rely on a single regulator,which seriously threatens users’privacy once the regulator is corrupt.To address this issue,we propose a linkable group signature against malicious regulators(ALGS)for regulated privacy-preserving cryptocurrencies.Specifically,a set of regulators work together to regulate users’behavior during cryptocurrencies transactions.Even if a certain number of regulators are corrupted,our scheme still ensures the identity security of a legal user.Meanwhile,our scheme can prevent double-spending during cryptocurrency transactions.We first propose the model of ALGS and define its security properties.Then,we present a concrete construction of ALGS,which provides CCA-2 anonymity,traceability,non-frameability,and linkability.We finally evaluate our ALGS scheme and report its advantages by comparing other schemes.The implementation result shows that the runtime of our signature algorithm is reduced by 17%compared to Emura et al.(2017)and 49%compared to KSS19(Krenn et al.2019),while the verification time is reduced by 31%compared to Emura et al.and 47%compared to KSS19.
基金supported by the National Natural Science Foundation of China(Grant Nos.U2001205,61932010)Guangdong Basic and Applied Basic Research Foundation(Nos.2023B1515040020,2019B030302008)Guangdong Provincial Key Laboratory of Power System Network Security(No.GPKLPSNS-2022-KF-05).
文摘To prevent misuse of privacy,numerous anonymous authentication schemes with linkability and/or traceability have been proposed to ensure different types of accountabilities.Previous schemes cannot simultaneously achieve public linking and tracing while holding access control,therefore,a new tool named linkable and traceable anonymous authentication with fine-grained access control(LTAA-FGAC)is offered,which is designed to satisfy:(i)access control,i.e.,only authorized users who meet a designated authentication policy are approved to authenticate messages;(ii)public linkability,i.e.,anyone can tell whether two authentications with respect to a common identifier are created by an identical user;(iii)public traceability,i.e.,everyone has the ability to deduce a double-authentication user’s identity from two linked authentications without the help of other parties.We formally define the basic security requirements for the new tool,and also give a generic construction so as to satisfy these requirements.Then,we present a formal security proof and an implementation of our proposed LTAA-FGAC scheme.
基金Supported by the Key Natural Science Foundation of Anhui Higher Education Institutions(2022AH052536)。
文摘In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication.Unconditional anonymous authentication can verify that the user belongs to an anonymous set,but the user's true identity cannot be obtained.However,in some applications,it is necessary to trace the true identity of the user.Therefore,a traceable anonymous authentication scheme is proposed.In order to prevent random tracing,the proposed scheme uses threshold joint tracing.When the identity of the authenticator needs to be traced,the threshold number of members can jointly trace the identity of the authenticator.In some special network applications such as anonymous electronic voting,in order to prevent repeated authentications and repeated elections,it is necessary to verify whether the two authentication signatures are signed by the same user without revealing the true identity of the user.Therefore,the proposed anonymous authentication scheme should have selective linkability.In order to achieve linkable authentication,the linkable tag is embedded by linkable ring signature.Compared with similar schemes through the simulation experiments,the implementation time of the proposed scheme is slightly better than other schemes.
基金the National Natural Science Foundation of China (Nos. 60703031, 60703004, 60673076)
文摘Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.