• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265
Citation: An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265

Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection

Funds: This work was supported by the Shandong Provincial Key Research and Development Program (2021CXGC010107) and the National Natural Science Foundation of China (U21A20466, 62172307, 62202339).
More Information
  • Author Bio:

    An Haoyang: born in 1997. PhD candidate. His main research interests include applied cryptography and blockchain technology

    He Debiao: born in 1980. PhD, professor, PhD supervisor. His main research interests include cryptography and information security

    Bao Zijian: born in 1994. PhD candidate. His main research interests include applied cryptography and blockchain technology. (baozijian@whu.edu.cn)

    Peng Cong: born in 1989. PhD, associate professor. His main research interests include cryptography and information security. (cpeng@whu.edu.cn)

    Luo Min: born in 1974. PhD, professor. His main research interests include cryptography and information security. (mluo@whu.edu.cn)

  • Received Date: March 31, 2023
  • Revised Date: June 07, 2023
  • Available Online: June 25, 2023
  • With the development and application of blockchain technology, the privacy leakage problem brought by blockchain technology has become increasingly serious while providing immutability and transparency. Although ring signature has been widely used in blockchain privacy protection schemes, existing schemes are based on public key infrastructure system with high certificate management costs. In addition, with the increasing demand for domestic application of blockchain systems, existing national commercial cryptographic algorithms can no longer meet the increasingly complex application requirements of blockchain. To solve these problems, we propose a constant-size ring signature scheme based on SM9 digital signature algorithm and prove its security under the random oracle model. In addition, based on this ring signature algorithm, we modify the consortium blockchain, Hyperledger Fabric, to achieve transaction sender identity privacy protection. We utilize the Miracl library to test the computation time and analyze the computational and communication costs of our approach. The experimental analysis results demonstrate that compared with existing solutions, our approach achieves several times efficiency improvement in signature generation and verification. When the number of ring members exceeds 20, our approach exhibits significant advantages in terms of signature communication costs.

  • [1]
    蒋宇娜,葛晓虎,杨旸,等. 面向6G的区块链物联网数据共享和存储机制[J]. 通信学报,2020,41(10):48−58

    Jiang Yuna, Ge Xiaohu, Yang Yang, et al. 6G oriented blockchain based Internet of things data sharing and storage mechanism[J]. Journal on Communications, 2020, 41(10): 48−58 (in Chinese)
    [2]
    Rivest R L, Shamir A, Tauman Y. How to leak a secret[C] //Proc of Annual Int Conf on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Berlin: Springer, 2001: 552–565
    [3]
    Chaum D, Eugène V H. Group signatures[C] //Proc of Int Conf on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Berlin: Springer, 1991: 257−265
    [4]
    Shen N. Ring signature confidential transactions for monero [EB/OL]. [2015-12-17]. https://eprint.iacr.org/2015/1098
    [5]
    Sun Shifeng, Man H A, Joseph K L, et al. RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero[C] //Proc of European Symp on Research in Computer Security (ESORICS). Berlin: Springer, 2017: 456−474
    [6]
    Bünz B, Shashank A, Mahdi Z, et al. Zether: Towards privacy in a smart contract world[C] //Proc of Financial Cryptography and Data Security (FC). Berlin: Springer, 2020: 423–443
    [7]
    Adi S. Identity-based cryptosystems and signature schemes[C] //Proc of Int Cryptology Conf (CRYPTO). Berlin: Springer, 1984: 47−53
    [8]
    Hess F. Efficient identity based signature schemes based on pairings[C] //Proc of Selected Areas in Cryptography (SAC). Berlin: Springer, 2002: 310−324
    [9]
    Barreto P S L M, Benoît L, Noel M, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C] //Proc of Annual Int Conf on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Berlin: Springer, 2005: 515−532
    [10]
    Paterson K G, Jacob C S. Efficient identity-based signatures secure in the standard model[C] //Proc of Australasia Conf on Information Security and Privacy (ACISP). Berlin: Springer, 2006: 207−222
    [11]
    中国国家标准化管理委员会. GM/T0044−2016 信息安全技术 SM9标识密码算法 第2部分: 数字签名算法[S]. 北京: 中国标准出版社, 2016

    National Standardization Management Committee of China. GM/T0044−2016 Information Security Technology SM9 Identity Password Algorithm Part 2: Digital Signature Algorithm [S]. Beijing: China Standard Press, 2016 (in Chinese)
    [12]
    赖建昌,黄欣沂,何德彪,等. 国密SM9数字签名和密钥封装算法的安全性分析[J]. 中国科学:信息科学,2021,51(11):1900−1913

    Lai Jianchang, Huang Xinyi, He Debiao, et al. Security analysis of national secret SM9 digital signature and key encapsulation algorithm[J]. SCIENTIA SINICA Informationis, 2021, 51(11): 1900−1913 (in Chinese)
    [13]
    朱留富,李继国,赖建昌等. 基于商密SM9的属性基在线/离线签名方案[J]. 计算机研究与发展,2023,60(2):362−370

    Zhu Liufu, Li Jiguo, Lai Jianchang, et al. Attribute-based online/offline signature scheme based on commercial secret SM9[J]. Journal of Computer Research and Development, 2023, 60(2): 362−370 (in Chinese)
    [14]
    赖建昌,黄欣沂,何德彪. 一种基于商密SM9的高效标识广播加密方案[J]. 计算机学报,2021,44(5):897−907

    Lai Jianchang, Huang Xinyi, He Debiao. An efficient identity broadcast encryption scheme based on commercial secret SM9[J]. Chinese Journal of Computers, 2021, 44(5): 897−907 (in Chinese)
    [15]
    张超,彭长根,丁红发,等. 基于国密SM9的可搜索加密方案[J]. 计算机工程,2022,48(7):159−167

    Zhang Chao, Peng Changgen, Ding Hongfa, et al. Searchable encryption scheme based on national secret SM9[J]. Computer Engineering, 2022, 48(7): 159−167 (in Chinese)
    [16]
    ,彭聪,何德彪,罗敏,等. 基于SM9标识密码算法的环签名方案[J]. 密码学报,2021,8(4):724−734

    Peng Cong, He Debiao, Luo Min, et al. Ring signature scheme based on SM9 identity password algorithm[J]. Journal of Cryptologic Research, 2021, 8(4): 724−734 (in Chinese)
    [17]
    Abe M, Miyako O, Koutarou S. 1-out-of-n signatures from a variety of keys[C] //Proc of Annual Int Conf on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Berlin: Springer, 2002: 415−432
    [18]
    Wong D S, Karyin F, Joseph K L, et al. On the RS-code construction of ring signature schemes and a threshold setting of RST[C] //Proc of Int Conf on Information and Communications Security (ICICS). Berlin: Springer, 2003: 34−46
    [19]
    Wang Shangping, Ma Rui, Zhang Yaling, et al. Ring signature scheme based on multivariate public key cryptosystems[J]. Computers & Mathematics with Applications, 2011, 62(10): 3973−3979
    [20]
    Lyubashevsky V. Lattice signatures without trapdoors[C] //Proc of Int Conf on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Berlin: Springer, 2012: 738−755
    [21]
    Wang Shangping, Zhao Ru, Zhang Yaling. Lattice-based ring signature scheme under the random oracle model[J]. International Journal of High Performance Computing and Networking, 2018, 11(4): 332−341 doi: 10.1504/IJHPCN.2018.093236
    [22]
    Dodis Y, Aggelos K, Antonio N, et al. Anonymous identification in ad hoc groups[C] //Proc of Int Conf on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Berlin: Springer, 2004: 609−626
    [23]
    Zhang Fangguo, Kwangjo K. ID-based blind signature and ring signature from pairings[C] //Proc of Annual Int Conf on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Berlin: Springer, 2002: 533−547
    [24]
    Herranz J, Germán S. New identity-based ring signature schemes[C] //Proc of Int Conf on Information and Communications Security (ICICS). Berlin: Springer, 2004: 27−39
    [25]
    Awasthi A K, Sunder L. ID-based ring signature and proxy ring signature schemes from bilinear pairings [EB/OL]. [2005-04-23]. https://arxiv.org/abs/cs/0504097
    [26]
    Nguyen L. Accumulators from bilinear pairings and applications[C] //Proc of the Cryptographer’s Track at RSA Conf (CT-RSA). Berlin: Springer, 2005: 275−292
    [27]
    Chow S, Siu-Ming Y, Lucas C K H. Efficient identity based ring signature[C] //Proc of Int Conf on Applied Cryptography and Network Security (ACNS). Berlin: Springer, 2005: 499−512
    [28]
    包嘉斌. 基于SM9标识密码算法的环签密方案设计及其应用研究[D]. 武汉: 武汉大学, 2022

    Bao Jiabin. Design and application research of ring signature encryption scheme based on SM9 identity password algorithm [D]. Wuhan: Wuhan University, 2022 (in Chinese)
    [29]
    邓浩明, 彭长根, 丁红发, 等. 基于国密SM9算法的门限环签名方案[J]. 计算机技术与发展, 2022, 32(12): 95−102

    Deng Haoming, Peng Changgen, Ding Hongfa, et al. A threshold ring signature scheme based on GM SM9 algorithm[J]. Computer Technology and Development, 2022, 32(12): 95−102 (in Chinese)
  • Related Articles

    [1]Wang Qiang, Zhou Fucai, Xuan Pengkai, Wu Qiyu. Publicly Verifiable Database Model with Full Operations Based on Bilinear Map[J]. Journal of Computer Research and Development, 2019, 56(3): 521-532. DOI: 10.7544/issn1000-1239.2019.20170839
    [2]Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12).
    [3]Zhu Hui, Li Hui, and Wang Yumin. Certificateless Signcryption Scheme Without Pairing[J]. Journal of Computer Research and Development, 2010, 47(9): 1587-1594.
    [4]Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612.
    [5]Chen Hu, Zhu Changjie, Song Rushun. Efficient Certificateless Signature and Group Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(2): 231-237.
    [6]Wang Qinglong, Han Zhen, Yang Bo. A Traitor Tracing Scheme Based on Bilinear Map[J]. Journal of Computer Research and Development, 2009, 46(3): 384-389.
    [7]Xu Peng, Cui Guohua, and Lei Fengyu. An Efficient and Provably Secure IBE Scheme Without Bilinear Map[J]. Journal of Computer Research and Development, 2008, 45(10): 1687-1695.
    [8]Song Yan. Homomorphic Commitment Schemes Based on Bilinear Groups[J]. Journal of Computer Research and Development, 2007, 44(9): 1532-1537.
    [9]Peng Huaxi and Feng Dengguo. A Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2007, 44(4): 574-580.
    [10]Ma Chunbo, He Dake. A New Chameleon Threshold Signature Based on Bilinear Pairing[J]. Journal of Computer Research and Development, 2005, 42(8): 1427-1430.
  • Cited by

    Periodical cited type(5)

    1. 欧阳志强,罗荣,张静. 基于ECC公钥加密体制的监控网络安全接入协议. 电子设计工程. 2024(18): 66-70 .
    2. 刘怡龙,许盛伟,岳梓岩. 密文长度固定的策略部分隐藏多授权机构CP-ABE方案. 通信学报. 2024(08): 20-36 .
    3. 李宏志,夏启寿,马小琴. 基于区块链的个人电子健康记录细粒度访问控制框架设计. 电脑知识与技术. 2024(29): 5-8+11 .
    4. 吴佐平,徐景龙,古敬彬,甄宗,刘若怡. 基于CP-ABE的客户服务平台异构数据共享方法. 中国新技术新产品. 2024(21): 42-44 .
    5. 王艳玲. 基于哈希值计算的数据爬取策略. 昆明冶金高等专科学校学报. 2024(06): 73-77 .

    Other cited types(7)

Catalog

    Article views (257) PDF downloads (148) Cited by(12)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return