{"title":"一种基于身份的分散系统群签名方法及中文密码SM2","authors":"Jiaxi Liu, Tianyu Kang, LingNa Guo","doi":"10.1145/3571662.3571683","DOIUrl":null,"url":null,"abstract":"While reducing costs and improving data security, the new generation of informatics technologies such as blockchain also face problems of operation efficiency and privacy leakage, which have attracted extensive attention from researchers. Digital signature is one of the key technologies to solve the above problems. The group signature algorithm has the dual characteristics of protecting the privacy of signer identity and tracing effectively when disputes occur. The scheme we proposed can simultaneously solve the low efficiency of signature verification caused by the high time-consuming bilinear pairwise operation in existing group signature algorithms and the privacy leakage of signers caused by the vulnerability of single group administrators to malicious attacks. Compared with the SM2 digital signature algorithm of Chinese cryptographic standard, the proposed scheme increases the signature anonymization while maintaining the same signature and verification efficiency as the SM2 signature algorithm. Compared with Yang et al. 's scheme, the main computation overhead and communication bandwidth of the proposed protocol are significantly reduced. Therefore, the design scheme in this paper has stronger practicability and is more suitable for scenarios that require both efficiency and strong privacy protection, such as blockchain, anonymous certificate, electronic cash and electronic voting.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Identity-based Group Signature Approach on Decentralized System and Chinese Cryptographic SM2\",\"authors\":\"Jiaxi Liu, Tianyu Kang, LingNa Guo\",\"doi\":\"10.1145/3571662.3571683\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While reducing costs and improving data security, the new generation of informatics technologies such as blockchain also face problems of operation efficiency and privacy leakage, which have attracted extensive attention from researchers. Digital signature is one of the key technologies to solve the above problems. The group signature algorithm has the dual characteristics of protecting the privacy of signer identity and tracing effectively when disputes occur. The scheme we proposed can simultaneously solve the low efficiency of signature verification caused by the high time-consuming bilinear pairwise operation in existing group signature algorithms and the privacy leakage of signers caused by the vulnerability of single group administrators to malicious attacks. Compared with the SM2 digital signature algorithm of Chinese cryptographic standard, the proposed scheme increases the signature anonymization while maintaining the same signature and verification efficiency as the SM2 signature algorithm. Compared with Yang et al. 's scheme, the main computation overhead and communication bandwidth of the proposed protocol are significantly reduced. Therefore, the design scheme in this paper has stronger practicability and is more suitable for scenarios that require both efficiency and strong privacy protection, such as blockchain, anonymous certificate, electronic cash and electronic voting.\",\"PeriodicalId\":235407,\"journal\":{\"name\":\"Proceedings of the 8th International Conference on Communication and Information Processing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 8th International Conference on Communication and Information Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3571662.3571683\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Communication and Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3571662.3571683","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Identity-based Group Signature Approach on Decentralized System and Chinese Cryptographic SM2
While reducing costs and improving data security, the new generation of informatics technologies such as blockchain also face problems of operation efficiency and privacy leakage, which have attracted extensive attention from researchers. Digital signature is one of the key technologies to solve the above problems. The group signature algorithm has the dual characteristics of protecting the privacy of signer identity and tracing effectively when disputes occur. The scheme we proposed can simultaneously solve the low efficiency of signature verification caused by the high time-consuming bilinear pairwise operation in existing group signature algorithms and the privacy leakage of signers caused by the vulnerability of single group administrators to malicious attacks. Compared with the SM2 digital signature algorithm of Chinese cryptographic standard, the proposed scheme increases the signature anonymization while maintaining the same signature and verification efficiency as the SM2 signature algorithm. Compared with Yang et al. 's scheme, the main computation overhead and communication bandwidth of the proposed protocol are significantly reduced. Therefore, the design scheme in this paper has stronger practicability and is more suitable for scenarios that require both efficiency and strong privacy protection, such as blockchain, anonymous certificate, electronic cash and electronic voting.