Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain

Jing Tian , Yanqi Zhao , Xiaoyi Yang , Xuan Zhao , Ruonan Chen , Yong Yu

High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (4) : 100271

PDF (599KB)
High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (4) :100271 DOI: 10.1016/j.hcc.2024.100271
Research Articles
research-article

Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain

Author information +
History +
PDF (599KB)

Abstract

Identity-based threshold signature (IDTHS) allows a threshold number of signers to generate signatures to improve the deterministic wallet in the blockchain. However, the IDTHS scheme cannot determine the identity of malicious signers in case of misinformation. To solve this challenge, we propose an identity-based threshold (multi) signature with private accountability (for short AIDTHS) for privacy-preserving blockchain. From the public perspective, AIDTHS is completely private and no user knows who participated in generating the signature. At the same time, when there is a problem with the transaction, a trace entity can trace and be accountable to the signers. We formally define the syntax and security model of AIDTHS. To address the issue of identifying malicious signers, we improve upon traditional identity-based threshold signatures by incorporating zero-knowledge proofs as part of the signature and leveraging a tracer holding tracing keys to identify all signers. Additionally, to protect the privacy of signers, the signature is no longer achievable by anyone, which requires a combiner holding the keys to produce a valid signature. We give a concrete construction of AIDTHS and prove its security. Finally, we implement the AIDTHS scheme and compare it with existing schemes. The key distribution algorithm of AIDTHS takes 13.04 ms and the signature algorithm takes 34.60 μs. The verification algorithm takes 1 s, which is one-third of the time the TAPS scheme uses.

Keywords

Identity-based signature / Threshold (multi) signature / Accountability / Blockchain

Cite this article

Download citation ▾
Jing Tian, Yanqi Zhao, Xiaoyi Yang, Xuan Zhao, Ruonan Chen, Yong Yu. Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain. High-Confidence Computing, 2024, 4(4): 100271 DOI:10.1016/j.hcc.2024.100271

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Jing Tian: Writing - original draft. Yanqi Zhao: Writing - original draft. Xiaoyi Yang: Writing - review & editing. Xuan Zhao: Formal analysis, Data curation. Ruonan Chen: Writing - original draft. Yong Yu: Writing - review & editing.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgments

This work was supported by the National Key R & D Program of China (2022YFB2701500), the National Natural Science Foundation of China (62272385, 62202375), Shaanxi Distinguished Youth Project, China (2022JC-47), the Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Research, China under Grant (ZR2022ZD03), the Key Research and Development Program of Shaanxi, China (2024GX-ZDCYL-01-09, 2024GX-ZDCYL-01-15) and Young Talent Fund of Association for Science and Technology in Shaanxi, China (20220134).

References

[1]

B. Wen, Y. Wang, Y. Ding, H. Zheng, B. Qin, C. Yang, Security and privacy protection technologies in securing blockchain applications, Inform. Sci. 645 (2023) 119322.

[2]

Z. Liu, G. Yang, D.S. Wong, K. Nguyen, H. Wang, X. Ke, Y. Liu, Secure deterministic wallet and stealth address: Key-insulated and privacy-preserving signature scheme with publicly derived public key, IEEE Trans. Depend. Secur. Comput. 19 (5) (2022) 2934-2951.

[3]

J. Baek, Y. Zheng, Identity-based threshold signature scheme from the bilinear pairings, in: International Conference on Information Technology: Coding and Computing (ITCC’04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, IEEE Computer Society, 2004, pp. 124-128.

[4]

A. Shamir, Identity-based cryptosystems and signature schemes, in: G.R. Blakley, D. Chaum (Eds.), Advances in Cryptology, Proceedings of CRYPTO ’84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, in: Lecture Notes in Computer Science, vol. 196, Springer, 1984, pp. 47-53.

[5]

M. Bellare, C. Namprempre, G. Neven, Security proofs for identity-based identification and signature schemes, 2004, Cryptology ePrint Archive, Paper 2004/252.

[6]

F. Hess, Efficient identity based signature schemes based on pairings, in:Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography, Springer-Verlag, Berlin, Heidelberg, 2002, pp. 310-324.

[7]

Y. Gu, Z. Shen, An accountable anonymous voting scheme based on one-time ring signature, in:2023 3rd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT, 2023, pp. 51-57.

[8]

Y. Yang, Z. Wei, M. Huang, Accountable policy-based sanitizable signature for medical data sharing, in:Proceedings of the 2022 12th International Conference on Communication and Network Security, 2022.

[9]

C. Wang, J. Kim, Fuzzy identity-based threshold signature scheme based on bilinear maps, in: T. Zhang (Ed.), 5th International Conference on BioMedical Engineering and Informatics, BMEI 2012, Chongqing, China, October 16-18, 2012, IEEE, 2012, pp. 1312-1316.

[10]

Y.-j. Geng, F.-y. Chen, An efficient identity-based threshold signature, in: 2010 International Conference on Internet Technology and Applications, 2010, pp. 1-3, http://dx.doi.org/10.1109/ITAPP.2010.5566632.

[11]

W. Gao, G. Wang, X. Wang, K. Chen, Efficient identity-based threshold signature scheme from bilinear pairings in the standard model, IACR Cryptol. ePrint Arch. (2012) 73.

[12]

S. Atapoor, Identity-based threshold signatures from isogenies, IACR Cryptol. ePrint Arch. (2023) 1459.

[13]

H. Liu, D. Han, M. Cui, K.-C. Li, A. Souri, M. Shojafar, IdenMultiSig: Identity-based decentralized multi-signature in internet of things, IEEE Trans. Comput. Soc. Syst. 10 (4) (2023) 1711-1721, http://dx.doi.org/10.1109/TCSS.2022.3232173.

[14]

P. Wei, B. Xia, A new ID-based threshold proxy signature scheme, in: 2021 IEEE International Conference on Artificial Intelligence and Computer Applications,ICAICA, 2021, pp. 1005-1008, http://dx.doi.org/10.1109/ICAICA52286.2021.9498100.

[15]

S. Xu, M. Yung,Accountable ring signatures: A smart card approach,in: J. Quisquater, P.Paradinas, Y.Deswarte, A.A.E.Kalam (Eds.), Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications, CARDIS, in:IFIP, vol. 153, Kluwer/Springer, 2004, pp. 271-286.

[16]

J. Bootle, A. Cerulli, P. Chaidos, E. Ghadafi, J. Groth, C. Petit, Short accountable ring signatures based on DDH, IACR Cryptol. ePrint Arch. (2015) 643.

[17]

Y. Liu, D. He, Z. Bao, M. Luo, C. Peng, PEACS: A privacy-enhancing and accountable car sharing system, IEEE Internet Things J. 11 (9) (2024) 16422-16435, http://dx.doi.org/10.1109/JIOT.2024.3353458.

[18]

V. Sucasas, G. Mantas, J. Bastos, F. Damião, J. Rodriguez, A signature scheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing, IEEE Trans. Mob. Comput. 19 (4) (2020) 752-768, http://dx.doi.org/10.1109/TMC.2019.2901463.

[19]

J. Shen, X. Chen, J. Wei, F. Guo, W. Susilo, Blockchain-based accountable auditing with multi-ownership transfer, IEEE Trans. Cloud Comput. 11 (3) (2023) 2711-2724, http://dx.doi.org/10.1109/TCC.2022.3224440.

[20]

T.X. Khuc, W. Susilo, D.H. Duong, F. Guo, K. Fukushima, S. Kiyomoto, Compact accountable ring signatures in the plain model, in: C. Ge, M. Yung (Eds.), Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I, in: Lecture Notes in Computer Science, vol. 14526, Springer, 2023, pp. 23-43.

[21]

D. Boneh, X. Boyen, H. Shacham, Short group signatures, IACR Cryptol. ePrint Arch. (2004) 174.

[22]

J. Furukawa, H. Imai, An efficient group signature scheme from bilinear maps, in: C. Boyd, J.M.G. Nieto (Eds.), Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, vol. 3574, Springer, 2005, pp. 455-467.

[23]

M. Bellare, D. Micciancio, B. Warinschi, Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, in: E. Biham (Ed.), Advances in Cryptology - EURO- CRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, vol. 2656, Springer, 2003, pp. 614-629.

[24]

S. Micali, K. Ohta, L. Reyzin,Accountable-subgroup multisignatures: extended abstract,in: M. K.Reiter, P.Samarati (Eds.), CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001, ACM, 2001, pp. 245-254.

[25]

D. Boneh, M. Drijvers, G. Neven, Compact multi-signatures for smaller blockchains, in: T. Peyrin, S.D. Galbraith (Eds.), Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, in: Lecture Notes in Computer Science, vol. 11273, Springer, 2018, pp. 435-464.

[26]

A.R. Agirtas, O. Yayla, Pairing-based accountable subgroup multi-signatures with verifiable group setup, IACR Cryptol. ePrint Arch. (2022) 18.

[27]

D. Ozden, O. Yayla, Verifiable timed accountable subgroup multi-signatures, in: V. Muthukkumarasamy, S.D. Sudarsan, R.K. Shyamasundar (Eds.), Information Systems Security - 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings, in: Lecture Notes in Computer Science, vol. 14424, Springer, 2023, pp. 295-305.

[28]

M. Kohlweiss, I. Miers, Accountable tracing signatures, IACR Cryptol. ePrint Arch. (2014) 824.

[29]

S. Ling, K. Nguyen, H. Wang, Y. Xu, Accountable tracing signatures from lattices, IACR Cryptol. ePrint Arch. (2018) 1251.

[30]

H.C. Pöhls, K. Samelin, Accountable redactable signatures, in: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015, IEEE Computer Society, 2015, pp. 60-69.

[31]

J. Ma, X. Huang, Y. Mu, R.H. Deng, Authenticated data redaction with accountability and transparency, IEEE Trans. Dependable Secure Comput. 19 (1) (2022) 149-160, http://dx.doi.org/10.1109/TDSC.2020.2998135.

[32]

D. Boneh, C. Komlo, Threshold signatures with private accountability, IACR Cryptol. ePrint Arch. (2022) 1636.

[33]

D. Boneh, A. Partap, L. Rotem, Proactive refresh for accountable threshold signatures, 2022, URL https://eprint.iacr.org/2022/1656. Cryptology ePrint Archive, Paper 2022/1656.

[34]

D. Boneh, A. Partap, B. Waters, Accountable multi-signatures with constant size public keys, IACR Cryptol. ePrint Arch. 2023 (2023) 1793.

[35]

M. Li, H. Ding, Q. Wang, M. Zhang, W. Meng, L. Zhu, Z. Zhang, X. Lin, Decentralized threshold signatures with dynamically private accountability, IEEE Trans. Inf. Forensics Secur. 19 (2024) 2217-2230, http://dx.doi.org/10.1109/TIFS.2023.3347968.

[36]

J. Camenisch, K. Haralambiev, M. Kohlweiss, J. Lapon, V. Naessens, Structure preserving CCA secure encryption and its application to oblivious third parties, 2011, https://eprint.iacr.org/2011/319. Cryptology ePrint Archive, Paper 2011/319.

[37]

A. Fiat, A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, in: A.M. Odlyzko (Ed.), Advances in Cryptology - CRYPTO ’86, Santa Barbara, California, USA, 1986, Proceedings, in: Lecture Notes in Computer Science, vol. 263, Springer, 1986, pp. 186-194.

[38]

T. Attema, S. Fehr, M. Klooß, Fiat-Shamir transformation of multi-round interactive proofs, IACR Cryptol. ePrint Arch. (2021) 1377.

AI Summary AI Mindmap
PDF (599KB)

785

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/