Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can ...Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can not distinguish whether the multisignature is signed by all the signers of the group or only by the last signer. Thus, any single signature created by the last signer can be used as a multisignaturr created by the whole group members. This paper proposes an improved scheme that can overcome the defect. In the new scheme, the identity messages of all the signers are added in the multisignature and used in verification phase, so that the verifier can know the signature is generated by which signers. Performance analysis shows that the proposed scheme costs less computation than the original scheme in both signature and verification phases. Furthermore, each partial signature is based on the signer's identity certificate, which makes the scheme more secure.展开更多
An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and b...An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups.展开更多
As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios.However,data on a blockchain cannot be deleted.A...As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios.However,data on a blockchain cannot be deleted.As a result,it is impossible to clean invalid and sensitive data and correct erroneous data.This,to a certain extent,hinders the application of blockchains in supply chains and Internet of Things.To address this problem,this study presents a deletable and modifiable blockchain scheme(DMBlockChain)based on record verification trees(RVTrees)and the multisignature scheme.(1)In this scheme,an RVTree structure is designed and added to the block structure.The RVTree can not only ensure that a record is true and valid but,owing to its unique binary structure,also verify whether modification and deletion requests are valid.(2)In DMBlockChain,the multisignature mechanism is also introduced.This mechanism requires the stakeholders’signatures for each modification or deletion request and thus ensures that a record will not be modified arbitrarily.A user’s request is deemed valid only if it is dually verified by the RVTree and the multisignature mechanism.The analysis finds that DMBlockChain can provide a secure and valid means for modifying and deleting records in a block while ensuring the integrity of the block and that DMBlockChain can effectively save space in some scenarios that require frequent records modification.展开更多
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment b...A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen's scheme.展开更多
A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific g...A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific group of verifiers and only any t or more verifiers together in the specific group of verifiers are able to verify the validity of the proxy multisignature on behalf of the group of specific verifiers, but t-1 or fewer verifiers can not. Since the proposed scheme is constructed based on elliptic curve, it requires smaller bandwidth and achieves more secrecy of data transmission; it is more etffcient for signature and verification etc.展开更多
In multisignature schemes signers can sign either in a linear order or not in any specified order, but neither of them is adequate in some scenarios where require mixture using of orderless and ordered multisignature....In multisignature schemes signers can sign either in a linear order or not in any specified order, but neither of them is adequate in some scenarios where require mixture using of orderless and ordered multisignature. Most order-specified multisignatures specified the orders as linear ones. In this paper, we proposed an order-specified multisignature scheme based on DSA secure against active insider attack. To our knowledge, it is the first order-specified multisignature scheme based on DSA signature scheme, in which signers can sign in flexible order represented by series-parallel graphs. In the multisignature scheme verification to both signers and signing order are available. The security of the scheme is proved by reduce to an identification scheme that is proved have some concrete security. The running time of verifying a signature is comparable to previous schemes while the running time of multisignature generation and the space needed is less than those schemes.展开更多
Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same secu...Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same security as JI and LIs multisignature scheme, but the new scheme has the lower computation. So the new scheme is the multisignature which has high security and low computation. It has the theory meaning and extensive application under the condition of SmartCard, etc.展开更多
This paper designed and implemented a blockchain-based multisignature approach to digitally transform supply chain governance in multi-tier food supply chains,particularly in a geographically dispersed beef supply cha...This paper designed and implemented a blockchain-based multisignature approach to digitally transform supply chain governance in multi-tier food supply chains,particularly in a geographically dispersed beef supply chain.An exploratory case study was utilised to demonstrate the design,implementation,and evaluation of a blockchainbased multisignature approach that was deployed on the Smart Trade Networks(STN)Proof of Authority(PoA)blockchain system for data collection and validation in a beef supply chain context.The multisignature approach was implemented with a use case to track a shipment of 92 cattle and meat products through key events from farm to food service.The use-case deployment records approximately 6000 data points registered on the STN PoA blockchain system.The real-case deployment illustrates the capability of the blockchain-based multisignature approach to digitally improve beef supply chain governance by enabling whole-of-chain transparency and trustworthy information sharing and supports supply chain professionals to have a better understanding of how to unlock blockchain potential for supply chain transformation.展开更多
The digital signature is a very important subject for network security.Considering multiple signers and multiple verifiers,Xie and Yu(2004) pointed out that the multisignature scheme of Laih and Yen(1996) is vulnerabl...The digital signature is a very important subject for network security.Considering multiple signers and multiple verifiers,Xie and Yu(2004) pointed out that the multisignature scheme of Laih and Yen(1996) is vulnerable to a harmful attack.An attack can occur when a specified group of verifiers cooperate to forge a multisignature by secret key substitution following the leak of a secret key or by group public key adjustment during the process of renewing membership.Xie and Yu proposed an improvement of Laih and Yen's multisignature scheme.In this paper,we show that Xie and Yu's scheme is vulnerable to clerk and rogue-key attacks.We propose an improved multisignature scheme to resist such attacks.In the proposed scheme,multiple signers can generate a multisignature for the message with the signers' secret keys,and the specified group of verifiers can cooperate to verify the validity of the multisignature with the signers' public keys and the verifiers' secret key.The proposed scheme for a special verifier group not only has the advantages of Xie and Yu's scheme,but also is secure against clerk and rogue-key attacks.展开更多
Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system ...Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system that has been widely used in cyberspace security in recent years.The most classic public key cryptography algorithm is RSA and its difficulty is based on the large integer decomposition problem.In 2017,ISRSAC was proposed by M.Thangaval.ISRSAC has made security improvements to the RSA algorithm by increasing the complexity in factoring the value of modulus‘n’.A digital signature algorithm based on ISRSAC algorithm was completed in this paper,and furthermore,a proxy signature algorithm based on ISRSAC and two kinds of multi-signature algorithms were presented,which include sequential multi-signature and broadcasting multi-signature.展开更多
So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is propo...So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is proposed by combining the proxy signature with ID-based public cryptography, and they formalize the notion of security for ID-based proxy signature schemes. And show that the security of the proposed scheme is secure. Compured with other proxy signature schemes, it does not need a secure channel. Thus, it is particularly suitable for the unreliable network computation environment. Finally, they extend proposed scheme to a proxy multi-signature which has the following advantages (1) the size of proxy multi- signature is independent of the number of delegating users; (2) the computation cost of proxy multi-signature only need two Weil paring.展开更多
We present a consensus mechanism in this paper that is designed specifically for supply chain blockchains,with a core focus on establishing trust among participating stakeholders through a novel reputation-based appro...We present a consensus mechanism in this paper that is designed specifically for supply chain blockchains,with a core focus on establishing trust among participating stakeholders through a novel reputation-based approach.The prevailing consensus mechanisms,initially crafted for cryptocurrency applications,prove unsuitable for the unique dynamics of supply chain systems.Unlike the broad inclusivity of cryptocurrency networks,our proposed mechanism insists on stakeholder participation rooted in process-specific quality criteria.The delineation of roles for supply chain participants within the consensus process becomes paramount.While reputation serves as a well-established quality parameter in various domains,its nuanced impact on non-cryptocurrency consensus mechanisms remains uncharted territory.Moreover,recognizing the primary role of efficient block verification in blockchain-enabled supply chains,our work introduces a comprehensive reputation model.This model strategically selects a leader node to orchestrate the entire block mining process within the consensus.Additionally,we innovate with a Schnorr Multisignature-based block verification mechanism seamlessly integrated into our proposed consensus model.Rigorous experiments are conducted to evaluate the performance and feasibility of our pioneering consensus mechanism,contributing valuable insights to the evolving landscape of blockchain technology in supply chain applications.展开更多
基金The National Natural Science Foundation of China (No.60403027)
文摘Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can not distinguish whether the multisignature is signed by all the signers of the group or only by the last signer. Thus, any single signature created by the last signer can be used as a multisignaturr created by the whole group members. This paper proposes an improved scheme that can overcome the defect. In the new scheme, the identity messages of all the signers are added in the multisignature and used in verification phase, so that the verifier can know the signature is generated by which signers. Performance analysis shows that the proposed scheme costs less computation than the original scheme in both signature and verification phases. Furthermore, each partial signature is based on the signer's identity certificate, which makes the scheme more secure.
基金Supported by the National 973 Project of China (No.G1999035803), the National Natural Science Foundation of China (No.60373104) and the National 863 Project of China (No.2002AA143021).
文摘An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups.
基金This work was supported by the Scientific and technological project of Henan Province(Grant Nos.202102310340,212102210414)Foundation of University Young Key Teacher of Henan Province(Grant Nos.2019GGJS040,2020GGJS027)+1 种基金Key scientific research projects of colleges and universities in Henan Province(Grant No.21A110005)National Natual Science Foundation of China(61701170).
文摘As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios.However,data on a blockchain cannot be deleted.As a result,it is impossible to clean invalid and sensitive data and correct erroneous data.This,to a certain extent,hinders the application of blockchains in supply chains and Internet of Things.To address this problem,this study presents a deletable and modifiable blockchain scheme(DMBlockChain)based on record verification trees(RVTrees)and the multisignature scheme.(1)In this scheme,an RVTree structure is designed and added to the block structure.The RVTree can not only ensure that a record is true and valid but,owing to its unique binary structure,also verify whether modification and deletion requests are valid.(2)In DMBlockChain,the multisignature mechanism is also introduced.This mechanism requires the stakeholders’signatures for each modification or deletion request and thus ensures that a record will not be modified arbitrarily.A user’s request is deemed valid only if it is dually verified by the RVTree and the multisignature mechanism.The analysis finds that DMBlockChain can provide a secure and valid means for modifying and deleting records in a block while ensuring the integrity of the block and that DMBlockChain can effectively save space in some scenarios that require frequent records modification.
基金Project (No. 10271037) supported by the National Natural Science Foundation of China
文摘A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen's scheme.
基金Supported by the Natural Science Foundation of Guang-dong Province (04300708)
文摘A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific group of verifiers and only any t or more verifiers together in the specific group of verifiers are able to verify the validity of the proxy multisignature on behalf of the group of specific verifiers, but t-1 or fewer verifiers can not. Since the proposed scheme is constructed based on elliptic curve, it requires smaller bandwidth and achieves more secrecy of data transmission; it is more etffcient for signature and verification etc.
基金Supported by the National Natural Science Foundation ofChina (60403027)
文摘In multisignature schemes signers can sign either in a linear order or not in any specified order, but neither of them is adequate in some scenarios where require mixture using of orderless and ordered multisignature. Most order-specified multisignatures specified the orders as linear ones. In this paper, we proposed an order-specified multisignature scheme based on DSA secure against active insider attack. To our knowledge, it is the first order-specified multisignature scheme based on DSA signature scheme, in which signers can sign in flexible order represented by series-parallel graphs. In the multisignature scheme verification to both signers and signing order are available. The security of the scheme is proved by reduce to an identification scheme that is proved have some concrete security. The running time of verifying a signature is comparable to previous schemes while the running time of multisignature generation and the space needed is less than those schemes.
基金Natural Science Foundation of Fujian Province of China( Z0511024)
文摘Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same security as JI and LIs multisignature scheme, but the new scheme has the lower computation. So the new scheme is the multisignature which has high security and low computation. It has the theory meaning and extensive application under the condition of SmartCard, etc.
基金This study was supported by funding from Food Agility CRC Ltd.and Future Food Systems CRC Ltd.,funded under the Commonwealth Government CRC Program.The CRC Program supports industry-led collaborations among industry,researchers,and the community.
文摘This paper designed and implemented a blockchain-based multisignature approach to digitally transform supply chain governance in multi-tier food supply chains,particularly in a geographically dispersed beef supply chain.An exploratory case study was utilised to demonstrate the design,implementation,and evaluation of a blockchainbased multisignature approach that was deployed on the Smart Trade Networks(STN)Proof of Authority(PoA)blockchain system for data collection and validation in a beef supply chain context.The multisignature approach was implemented with a use case to track a shipment of 92 cattle and meat products through key events from farm to food service.The use-case deployment records approximately 6000 data points registered on the STN PoA blockchain system.The real-case deployment illustrates the capability of the blockchain-based multisignature approach to digitally improve beef supply chain governance by enabling whole-of-chain transparency and trustworthy information sharing and supports supply chain professionals to have a better understanding of how to unlock blockchain potential for supply chain transformation.
基金supported in part by the National Science Council (Nos.NSC 97-2745-P-001-001-,NSC 98-2219-E-011-001-,NSC 98-2221-E-011-073-MY3,and NSC 98-2218-E-011-018-)
文摘The digital signature is a very important subject for network security.Considering multiple signers and multiple verifiers,Xie and Yu(2004) pointed out that the multisignature scheme of Laih and Yen(1996) is vulnerable to a harmful attack.An attack can occur when a specified group of verifiers cooperate to forge a multisignature by secret key substitution following the leak of a secret key or by group public key adjustment during the process of renewing membership.Xie and Yu proposed an improvement of Laih and Yen's multisignature scheme.In this paper,we show that Xie and Yu's scheme is vulnerable to clerk and rogue-key attacks.We propose an improved multisignature scheme to resist such attacks.In the proposed scheme,multiple signers can generate a multisignature for the message with the signers' secret keys,and the specified group of verifiers can cooperate to verify the validity of the multisignature with the signers' public keys and the verifiers' secret key.The proposed scheme for a special verifier group not only has the advantages of Xie and Yu's scheme,but also is secure against clerk and rogue-key attacks.
基金This work has been performed in National Natural Science Foundation of China(No.61772047,61372069)the Fundamental Research Funds for the Central Universities(No.328201902)+2 种基金National Defense Pre-research Foundation,SRF for ROCS,SEM(JY0600090102)111 project(No.B08038)China Civil Aviation Information Technology Research Base Funded Project(CAAC-ITRB-201705).
文摘Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system that has been widely used in cyberspace security in recent years.The most classic public key cryptography algorithm is RSA and its difficulty is based on the large integer decomposition problem.In 2017,ISRSAC was proposed by M.Thangaval.ISRSAC has made security improvements to the RSA algorithm by increasing the complexity in factoring the value of modulus‘n’.A digital signature algorithm based on ISRSAC algorithm was completed in this paper,and furthermore,a proxy signature algorithm based on ISRSAC and two kinds of multi-signature algorithms were presented,which include sequential multi-signature and broadcasting multi-signature.
基金Supported by the Scientific Research Common Program of Beijing Municipal Commission of Education (KM200610009011) and the Open Foundation of State Key Laboratory of Information Security (04002)
文摘So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is proposed by combining the proxy signature with ID-based public cryptography, and they formalize the notion of security for ID-based proxy signature schemes. And show that the security of the proposed scheme is secure. Compured with other proxy signature schemes, it does not need a secure channel. Thus, it is particularly suitable for the unreliable network computation environment. Finally, they extend proposed scheme to a proxy multi-signature which has the following advantages (1) the size of proxy multi- signature is independent of the number of delegating users; (2) the computation cost of proxy multi-signature only need two Weil paring.
基金made possible by NPRP(NPRP11S-1227-1701359)from the Qatar National Research Fund(a member of Qatar Foundation).
文摘We present a consensus mechanism in this paper that is designed specifically for supply chain blockchains,with a core focus on establishing trust among participating stakeholders through a novel reputation-based approach.The prevailing consensus mechanisms,initially crafted for cryptocurrency applications,prove unsuitable for the unique dynamics of supply chain systems.Unlike the broad inclusivity of cryptocurrency networks,our proposed mechanism insists on stakeholder participation rooted in process-specific quality criteria.The delineation of roles for supply chain participants within the consensus process becomes paramount.While reputation serves as a well-established quality parameter in various domains,its nuanced impact on non-cryptocurrency consensus mechanisms remains uncharted territory.Moreover,recognizing the primary role of efficient block verification in blockchain-enabled supply chains,our work introduces a comprehensive reputation model.This model strategically selects a leader node to orchestrate the entire block mining process within the consensus.Additionally,we innovate with a Schnorr Multisignature-based block verification mechanism seamlessly integrated into our proposed consensus model.Rigorous experiments are conducted to evaluate the performance and feasibility of our pioneering consensus mechanism,contributing valuable insights to the evolving landscape of blockchain technology in supply chain applications.