Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Auditable signature scheme for blockchain based on secure multi-party
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei
Journal of Computer Applications    2020, 40 (9): 2639-2645.   DOI: 10.11772/j.issn.1001-9081.2020010096
Abstract363)      PDF (983KB)(697)       Save
Aiming at the credibility problem, a secure multi-party blockchain auditable signature scheme was proposed. In the proposed scheme, the trust vector with timestamp was introduced, and a trust matrix composed of multi-dimensional vector groups was constructed for regularly recording the trustworthy behavior of participants, so that a credible evaluation mechanism for the participants was established. Finally, the evaluation results were stored in the blockchain as a basis for verification. On the premise of ensuring that the participants are trusted, a secure and trusted signature scheme was constructed through secret sharing technology. Security analysis shows that the proposed scheme can effectively reduce the damages brought by the malicious participants, detect the credibility of participants, and resist mobile attacks. Performance analysis shows that the proposed scheme has lower computational complexity and higher execution efficiency.
Reference | Related Articles | Metrics
Threshold signature scheme suitable for blockchain electronic voting scenes
CHENG Yage, JIA Zhijuan, HU Mingsheng, GONG Bei, WANG Lipeng
Journal of Computer Applications    2019, 39 (9): 2629-2635.   DOI: 10.11772/j.issn.1001-9081.2019030513
Abstract514)      PDF (1051KB)(460)       Save

When traditional signature algorithms such as blind signature and group signature applied to heterogeneous networks of blockchain, they might have problems like relying on trusted centers or low efficiency. Aiming at the problems, a threshold signature scheme suitable for blockchain electronic voting scenes was proposed. The proposed scheme was based on the Asmuth-Bloom secret sharing scheme and did not need a trusted center. Firstly, the signature was generated by the collaboration of blockchain nodes, implementing mutual verification between nodes and improving the node credibility. Secondly, a mechanism of nodes joining and exiting was established to adapt to the high mobility of the blockchain nodes. Finally, the node private keys were updated regularly to resist mobile attacks and make them forward-secure. Security analysis shows that the security of the scheme is based on the discrete logarithm problem, so that the scheme can effectively resist mobile attacks and is forward-secure. The performance analysis shows that compared with other schemes, this scheme has lower computational complexity in the signature generation and verification phases. The results show that the proposed scheme can be well applied to blockchain electronic voting scenes.

Reference | Related Articles | Metrics