Proven secure blind adaptor signature scheme based on the SM2
Adaptor signature (AS) is a novel cryptographic primitive that has gained prominence in recent years for its ability to link the signature process with the revelation of a secret value. The process involves adapting a pre-signature to a formal signature, ensuring that the final signature result alig...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2024-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024024 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529535405752320 |
---|---|
author | HU Xiaoming CHEN Haichan |
author_facet | HU Xiaoming CHEN Haichan |
author_sort | HU Xiaoming |
collection | DOAJ |
description | Adaptor signature (AS) is a novel cryptographic primitive that has gained prominence in recent years for its ability to link the signature process with the revelation of a secret value. The process involves adapting a pre-signature to a formal signature, ensuring that the final signature result aligns with conventional signatures. Both the pre-signature and the formal signature are capable of extracting a secret value, which endows AS with atomicity and suggests its promising application within blockchain technologies. However, the lack of anonymity in AS can lead to the exposure of transaction participants' identities, which may limit its application in scenarios demanding high privacy standards, such as electronic payments. To address this issue, a new blind adaptor signature system model and security model were proposed. Subsequently, a blind adaptor signature scheme was developed based on the SM2 signature algorithm, leveraging the new system model. The security of this new scheme, which was founded on the unforgeability and the hardness of the SM2 signature scheme, was demonstrated to meet the requirements of the newly proposed security model. Specifically, the scheme was proven to satisfy properties such as blindness, pre-signature adaptability, unforgeability, and witness extractability. Performance analysis indicates that the computational overhead of the SM2 blind adaptor signature scheme is minimal, with the total operation time of the signature process only increasing by a negligible 5.91ms compared to the SM2 adaptor signature scheme. Moreover, when compared to existing similar schemes, the SM2 blind adaptor signature scheme offers enhanced blindness and autonomy, making it particularly valuable for key application scenarios that necessitate high privacy requirements and the utilization of domestic cryptographic algorithms. |
format | Article |
id | doaj-art-8076e4c3eebd490eaba90a3e516d9526 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2024-04-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-8076e4c3eebd490eaba90a3e516d95262025-01-15T03:17:08ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-04-0110596863897427Proven secure blind adaptor signature scheme based on the SM2HU XiaomingCHEN HaichanAdaptor signature (AS) is a novel cryptographic primitive that has gained prominence in recent years for its ability to link the signature process with the revelation of a secret value. The process involves adapting a pre-signature to a formal signature, ensuring that the final signature result aligns with conventional signatures. Both the pre-signature and the formal signature are capable of extracting a secret value, which endows AS with atomicity and suggests its promising application within blockchain technologies. However, the lack of anonymity in AS can lead to the exposure of transaction participants' identities, which may limit its application in scenarios demanding high privacy standards, such as electronic payments. To address this issue, a new blind adaptor signature system model and security model were proposed. Subsequently, a blind adaptor signature scheme was developed based on the SM2 signature algorithm, leveraging the new system model. The security of this new scheme, which was founded on the unforgeability and the hardness of the SM2 signature scheme, was demonstrated to meet the requirements of the newly proposed security model. Specifically, the scheme was proven to satisfy properties such as blindness, pre-signature adaptability, unforgeability, and witness extractability. Performance analysis indicates that the computational overhead of the SM2 blind adaptor signature scheme is minimal, with the total operation time of the signature process only increasing by a negligible 5.91ms compared to the SM2 adaptor signature scheme. Moreover, when compared to existing similar schemes, the SM2 blind adaptor signature scheme offers enhanced blindness and autonomy, making it particularly valuable for key application scenarios that necessitate high privacy requirements and the utilization of domestic cryptographic algorithms.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024024SM2 digital signatureblind adaptor signatureatomicityanonymity |
spellingShingle | HU Xiaoming CHEN Haichan Proven secure blind adaptor signature scheme based on the SM2 网络与信息安全学报 SM2 digital signature blind adaptor signature atomicity anonymity |
title | Proven secure blind adaptor signature scheme based on the SM2 |
title_full | Proven secure blind adaptor signature scheme based on the SM2 |
title_fullStr | Proven secure blind adaptor signature scheme based on the SM2 |
title_full_unstemmed | Proven secure blind adaptor signature scheme based on the SM2 |
title_short | Proven secure blind adaptor signature scheme based on the SM2 |
title_sort | proven secure blind adaptor signature scheme based on the sm2 |
topic | SM2 digital signature blind adaptor signature atomicity anonymity |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024024 |
work_keys_str_mv | AT huxiaoming provensecureblindadaptorsignatureschemebasedonthesm2 AT chenhaichan provensecureblindadaptorsignatureschemebasedonthesm2 |