메뉴 건너뛰기




Volumn 6, Issue , 2018, Pages 20632-20640

An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain

Author keywords

bilinear pairings; homomorphic signature; ID based signature; random oracle

Indexed keywords

BLOCKCHAIN; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC MAIL; PUBLIC KEY CRYPTOGRAPHY;

EID: 85042715169     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2018.2809426     Document Type: Article
Times cited : (190)

References (41)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Aug.
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Crypto, vol. 84, pp. 47-53, Aug. 1984.
    • (1984) Crypto , vol.84 , pp. 47-53
    • Shamir, A.1
  • 3
    • 85020050894 scopus 로고    scopus 로고
    • Insight of the protection for data security under selective opening attacks
    • Oct.
    • Z. Huang, S. Liu, X. Mao, K. Chen, and J. Li, "Insight of the protection for data security under selective opening attacks," Inf. Sci., vols. 412-413, pp. 223-241, Oct. 2017.
    • (2017) Inf. Sci. , vol.412-413 , pp. 223-241
    • Huang, Z.1    Liu, S.2    Mao, X.3    Chen, K.4    Li, J.5
  • 4
    • 84901032811 scopus 로고    scopus 로고
    • Secure deduplication with efficient and reliable convergent key management
    • Jun.
    • J. Li, X. Chen, M. Li, J. Li, P. P. C. Lee, andW. Lou, "Secure deduplication with efficient and reliable convergent key management," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, pp. 1615-1625, Jun. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.6 , pp. 1615-1625
    • Li, J.1    Chen, X.2    Li, M.3    Li, J.4    Lee, P.P.C.5    Lou, W.6
  • 5
    • 84875220193 scopus 로고    scopus 로고
    • Inapproximability results for the minimum integral solu-tion problem with preprocessing over l1 norm
    • Mar.
    • W. Chen et al., "Inapproximability results for the minimum integral solu-tion problem with preprocessing over l1 norm," Theor. Comput. Sci., vol. 478, pp. 127-131, Mar. 2013.
    • (2013) Theor. Comput. Sci. , vol.478 , pp. 127-131
    • Chen, W.1
  • 6
    • 84940722054 scopus 로고    scopus 로고
    • An improved lower bound for approximating the minimum integral solution problem with preprocessing over l1norm
    • W. Chen et al., "An improved lower bound for approximating the minimum integral solution problem with preprocessing over l1norm," J. Combinat. Optim., vol. 30, no. 3, pp. 447-455, 2015.
    • (2015) J. Combinat. Optim. , vol.30 , Issue.3 , pp. 447-455
    • Chen, W.1
  • 7
    • 84861691857 scopus 로고    scopus 로고
    • Improved security for linearly homomorphic signa-tures: A generic framework
    • Berlin, Germany: Springer
    • D. M. Freeman, "Improved security for linearly homomorphic signa-tures: A generic framework," in Public Key Cryptography-PKC (Lecture Notes in Computer Science), vol 7293. Berlin, Germany: Springer, 2012, pp. 697-714.
    • (2012) Public Key Cryptography-PKC (Lecture Notes in Computer Science) , vol.7293 , pp. 697-714
    • Freeman, D.M.1
  • 9
    • 84927584035 scopus 로고    scopus 로고
    • A hybrid cloud approach for secure authorized deduplication
    • May
    • J. Li, Y. K. Li, X. Chen, P. P. C. Lee, andW. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.5 , pp. 1206-1216
    • Li, J.1    Li, Y.K.2    Chen, X.3    Lee, P.P.C.4    Lou, W.5
  • 10
    • 84946905043 scopus 로고    scopus 로고
    • Secure distributed deduplication systems with improved reli-ability
    • Dec.
    • J. Li et al., "Secure distributed deduplication systems with improved reli-ability," IEEE Trans. Comput., vol. 64, no. 12, pp. 3569-3579, Dec. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.12 , pp. 3569-3579
    • Li, J.1
  • 11
    • 1642409507 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • J. Choon and J. Cheon, "An identity-based signature from gap Diffie-Hellman groups," in Proc. Int. Workshop Public Key Cryptogr., 2003, pp. 18-30.
    • (2003) Proc. Int. Workshop Public Key Cryptogr. , pp. 18-30
    • Choon, J.1    Cheon, J.2
  • 15
    • 85044261898 scopus 로고    scopus 로고
    • Homomorphic signatures for polynomial functions with shorter signatures
    • Kyoto, Japan
    • R. Hiromasa, Y. Manabe, and T. Okamoto, "Homomorphic signatures for polynomial functions with shorter signatures," in Proc. 30th Symp. Cryptogr. Inf. Secur., Kyoto, Japan, 2013, pp. 1-8.
    • (2013) Proc. 30th Symp. Cryptogr. Inf. Secur. , pp. 1-8
    • Hiromasa, R.1    Manabe, Y.2    Okamoto, T.3
  • 16
    • 85028920194 scopus 로고    scopus 로고
    • Secure attribute-based data sharing for resource-limited users in cloud computing
    • Jan.
    • J. Li, Y. Zhang, X. Chen, and Y. Xiang, "Secure attribute-based data sharing for resource-limited users in cloud computing," Comput. Secur., vol. 72, pp. 1-12, Jan. 2018, doi: 10.1016/j.cose.2017.08.007.
    • (2018) Comput. Secur. , vol.72 , pp. 1-12
    • Li, J.1    Zhang, Y.2    Chen, X.3    Xiang, Y.4
  • 17
    • 84943000168 scopus 로고    scopus 로고
    • Adaptively secure fully homo-morphic signatures based on lattices
    • ePrint Arch., Tech. Rep. 2014/916
    • X. Boyen, X. Fan, and E. Shi, "Adaptively secure fully homo-morphic signatures based on lattices," IACR Cryptol. ePrint Arch., Tech. Rep. 2014/916, 2014.
    • (2014) IACR Cryptol]
    • Boyen, X.1    Fan, X.2    Shi, E.3
  • 18
    • 85017138287 scopus 로고    scopus 로고
    • Privacy-preserving outsourced classification in cloud computing
    • New York, NY, USA: Springer
    • P. Li, J. Li, Z. Huang, C.-Z. Gao, W.-B. Chen, and K. Chen, "Privacy-preserving outsourced classification in cloud computing," in Clus-ter Computing. New York, NY, USA: Springer, 2017, pp. 1-10, doi: 10.1007/s10586-017-0849-9.
    • (2017) Clus-Ter Computing , pp. 1-10
    • Li, P.1    Li, J.2    Huang, Z.3    Gao, C.-Z.4    Chen, W.-B.5    Chen, K.6
  • 19
    • 84925258036 scopus 로고    scopus 로고
    • Leveled fully homo-morphic signatures from standard lattices
    • ePrint Arch., Tech. Rep. 2014/897 Online
    • S. Gorbunov, V. Vaikuntanathan, and D. Wichs, "Leveled fully homo-morphic signatures from standard lattices," IACR Cryptol. ePrint Arch., Tech. Rep. 2014/897, 2014. [Online]. Available: http://eprint.iacr.org/
    • (2014) IACR Cryptol
    • Gorbunov, S.1    Vaikuntanathan, V.2    Wichs, D.3
  • 20
    • 84873972598 scopus 로고    scopus 로고
    • Efficient completely context-hiding quotable and linearly homomorphic signatures
    • Berlin, Germany: Springer
    • N. Attrapadung, B. Libert, and T. Peters, "Efficient completely context-hiding quotable and linearly homomorphic signatures," in Public-Key Cryptography-PKC (Lecture Notes in Computer Science), vol 7778. Berlin, Germany: Springer, 2013, pp. 386-404.
    • (2013) Public-Key Cryptography-PKC (Lecture Notes in Computer Science) , vol.7778 , pp. 386-404
    • Attrapadung, N.1    Libert, B.2    Peters, T.3
  • 21
    • 84921381171 scopus 로고    scopus 로고
    • Identity-based encryption with outsourced revocation in cloud computing
    • Feb.
    • J. Li, J. Li, X. Chen, C. Jia, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Trans. Comput., vol. 64, no. 2, pp. 425-437, Feb. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.2 , pp. 425-437
    • Li, J.1    Li, J.2    Chen, X.3    Jia, C.4    Lou, W.5
  • 23
    • 79952503806 scopus 로고    scopus 로고
    • Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
    • Berlin, Germany: Springer
    • D. Boneh and D. Freeman, "Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures," in Public Key Cryptography-PKC (Lecture Notes in Computer Science), vol 6571. Berlin, Germany: Springer, 2011, pp. 1-16.
    • (2011) Public Key Cryptography-PKC (Lecture Notes in Computer Science) , vol.6571 , pp. 1-16
    • Boneh, D.1    Freeman, D.2
  • 26
    • 84964344073 scopus 로고    scopus 로고
    • Lattice-based linearly homomorphic signa-tures in the standard model
    • Jun.
    • W. Chen, H. Lei, and K. Qi, "Lattice-based linearly homomorphic signa-tures in the standard model," Theor. Comput. Sci., vol. 634, pp. 47-54, Jun. 2016.
    • (2016) Theor. Comput. Sci. , vol.634 , pp. 47-54
    • Chen, W.1    Lei, H.2    Qi, K.3
  • 27
    • 85018906248 scopus 로고    scopus 로고
    • Multi-key privacy-preserving deep learning in cloud comput-ing
    • Sep.
    • P. Li et al., "Multi-key privacy-preserving deep learning in cloud comput-ing," Future Generat. Comput. Syst., vol. 74, pp. 76-85, Sep. 2017.
    • (2017) Future Generat. Comput. Syst. , vol.74 , pp. 76-85
    • Li, P.1
  • 28
    • 84994682630 scopus 로고    scopus 로고
    • Leakage-resilient ID-based signature scheme in the generic bilinear group model
    • J.-D. Wu, Y.-M. Tseng, and S.-S. Huang, "Leakage-resilient ID-based signature scheme in the generic bilinear group model," Secur. Commun. Netw., vol. 9, no. 17, pp. 3987-4001, 2016.
    • (2016) Secur. Commun. Netw. , vol.9 , Issue.17 , pp. 3987-4001
    • Wu, J.-D.1    Tseng, Y.-M.2    Huang, S.-S.3
  • 29
    • 85038401634 scopus 로고    scopus 로고
    • Asecure ID-based proxy signature scheme from bilinear pairings
    • P. Sarde and A. Banerjee, "Asecure ID-based proxy signature scheme from bilinear pairings," Int. J. Comput. Appl., vol. 124, no. 9, pp. 1-4, 2015.
    • (2015) Int. J. Comput. Appl. , vol.124 , Issue.9 , pp. 1-4
    • Sarde, P.1    Banerjee, A.2
  • 30
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 31
    • 84911471015 scopus 로고    scopus 로고
    • An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
    • C. Meshram, "An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem," Inf. Pro-cess. Lett., vol. 115, no. 2, pp. 351-358, 2015.
    • (2015) Inf. Pro-Cess. Lett. , vol.115 , Issue.2 , pp. 351-358
    • Meshram, C.1
  • 33
    • 84989847479 scopus 로고    scopus 로고
    • Inductive hierarchical identity based key agreement with pre-deployment interactions
    • P. Sarkar and M. Chowdhury, "Inductive hierarchical identity based key agreement with pre-deployment interactions," in Proc. Int. Conf. Appl. Techn. Inf. Secur., 2016, pp. 106-114.
    • (2016) Proc. Int. Conf. Appl. Techn. Inf. Secur. , pp. 106-114
    • Sarkar, P.1    Chowdhury, M.2
  • 36
    • 84930542540 scopus 로고    scopus 로고
    • L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
    • May
    • J. Li, Z. Liu, X. Chen, "L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing," Knowl.-Based Syst., vol. 79, pp. 18-26, May 2015.
    • (2015) Knowl.-Based Syst. , vol.79 , pp. 18-26
    • Li, J.1    Liu, Z.2    Chen, X.3
  • 37
    • 84945936179 scopus 로고    scopus 로고
    • Leveled strongly-unforgeable identity-based fully homomorphic signatures
    • F. Wang, K. Wang, B. Li, and Y. Gao, "Leveled strongly-unforgeable identity-based fully homomorphic signatures," in Proc. ISC, 2015, pp. 42-60.
    • (2015) Proc. ISC , pp. 42-60
    • Wang, F.1    Wang, K.2    Li, B.3    Gao, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.