Table of Contents Author Guidelines Submit a Manuscript
Corrigendum

A corrigendum for this article has been published. To view the corrigendum, please click here.

Security and Communication Networks
Volume 2017 (2017), Article ID 4746586, 10 pages
https://doi.org/10.1155/2017/4746586
Research Article

Research on a New Signature Scheme on Blockchain

State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University, Zhengzhou 450001, China

Correspondence should be addressed to Chao Yuan; moc.361@xdcgxx_cy

Received 7 May 2017; Accepted 20 July 2017; Published 21 August 2017

Academic Editor: Xiaojiang Du

Copyright © 2017 Chao Yuan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system,” 2009, https://bitcoin.org/bitcoin.pdf.
  2. N. Saberhagen, “Crypto Note v 2.0,” Cryp to Note, 2013.
  3. S. Noether, “Ring signature confidential transactions,” 2015, https://eprint.iacr.org/2015/1098.
  4. E. Ben-Sasson, A. Chiesa, C. Garman et al., “Zerocash: decentralized anonymous payments from bitcoin,” in Proceedings of the 35th IEEE Symposium on Security and Privacy, (SP '14), pp. 459–474, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Rackoff and D. R. Simon, “Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack,” LNCS 576, pp. 433–444, 1992. View at Google Scholar
  6. M. Blum, P. Feldman, and S. Micali, “Non-interactive zero-knowledge and its applications,” in Proceedings of the 20th Annual ACM Symposium on Theory of Computing, STOC 1988, pp. 103–112, May 1988. View at Publisher · View at Google Scholar · View at Scopus
  7. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and verifiably encrypted signatures from bilinear maps,” in Lecture Notes in Computer Science, vol. 2656 of Lecture Notes in Comput. Sci., pp. 416–432, Springer, 2003. View at Publisher · View at Google Scholar · View at MathSciNet
  8. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “A survey of two signature aggregation techniques,” CryptoBytes, vol. 6, no. 2, 2003. View at Google Scholar
  9. N. Koblitz, A. Menezes, and S. Vanstone, “The state of elliptic curve cryptography,” Designs, Codes and Cryptography. An International Journal, vol. 19, no. 2-3, pp. 173–193, 2000. View at Publisher · View at Google Scholar · View at MathSciNet
  10. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the Association for Computing Machinery, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” International Journal of Information Security, vol. 1, no. 1, pp. 36–63, 2001. View at Publisher · View at Google Scholar
  12. ANSI X9.62, “The elliptic curve digital signature algorithm,” Public Key Cryptography for the Financial Services Industry, 1999.
  13. H. Dobbertin, A. Bosselaers, and B. Preneel, “RIPEMD-160: A strengthened version of RIPEMD,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1039, pp. 71–82, 1996. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Dobbertin, “RIPEMD with two-round compress function is not collision-free,” Journal of Cryptology, vol. 10, no. 1, pp. 51–69, 1997. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Shariffar, “SHA1 and SHA256 custom instruction design and characterization on Nios II processor,” Journal of the American Oil Chemists Society, vol. 81, no. 10, pp. 979–987, 2012. View at Google Scholar
  16. M. Juliato and C. Gebotys, “Tailoring a reconfigurable platform to SHA-256 and HMAC through custom instructions and peripherals,” in Proceedings of the 2009 International Conference on ReConFigurable Computing and FPGAs, ReConFig'09, pp. 195–200, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Goldwasser and S. Micali, “Probabilistic encryption,” Journal of Computer and System Sciences, vol. 28, no. 2, pp. 270–299, 1984. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. A. Joux and V. Vitse, “Elliptic curve discrete logarithm problem over small degree extension fields,” Journal of Cryptology. The Journal of the International Association for Cryptologic Research, vol. 26, no. 1, pp. 119–143, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully homomorphic encryption over the integers,” in Proceedings of the International Conference on Theory and Applications of Cryptographic Techniques, vol. 2009, pp. 24–43, Springer, Berlin, Germany, 2010. View at MathSciNet
  20. C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proceedings of the 41st Annual ACM Symposium on Theory of Computing, (STOC '09), pp. 169–178, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. I. Eyal, “The miner's dilemma,” in Proceedings of the 36th IEEE Symposium on Security and Privacy, SP 2015, pp. 89–103, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Sapirshtein, Y. Sompolinsky, and A. Zohar, “Optimal selfish mining strategies in bitcoin,” in Financial Cryptography and Data Security, vol. 9603 of Lecture Notes in Computer Science, pp. 515–532, Springer, Berlin, Germany, 2017. View at Publisher · View at Google Scholar
  23. E. Heilman, A. Kendler, and A. Zohar, “Eclipse attacks on bitcoins peer-to-peer network,” Usenix Conference on Security Symposium. USENIX Association, vol. 45, no. 3, pp. 129–144, 2015. View at Google Scholar
  24. K. Nayak, S. Kumar, A. Miller, and E. Shi, “Stubborn mining: generalizing selfish mining and combining with an eclipse attack,” in Proceedings of the 1st IEEE European Symposium on Security and Privacy, pp. 305–320, March 2016. View at Publisher · View at Google Scholar · View at Scopus
  25. B. Adida, S. Hohenberger, and R. L. Rivest, “Ad-hoc-group signatures from hi-jacked keypairs,” In Domacs workshop on Theft in E-Commerce, 2005.
  26. S. Micali, K. Ohta, and L. Reyzin, “Accountable-subgroup multisignatures,” in Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS '01), pp. 245–254, Philadelphia, Pa, USA, November 2001. View at Publisher · View at Google Scholar · View at Scopus
  27. A. Singh, G. Rumantir, A. South, and B. Bethwaite, “Clustering experiments on big transaction data for market segmentation,” in Proceedings of the 3rd ASE International Conference on Big Data Science and Computing, BIGDATASCIENCE 2014, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. N. Asokan, V. Shoup, and M. Waidner, “Optimistic fair exchange of digital signatures,” IEEE Journal on Selected Areas in Communications, vol. 18, no. 4, pp. 593–610, 2000. View at Publisher · View at Google Scholar · View at Scopus
  29. X. Du, M. Shayman, and M. Rozenblit, “Implementation and performance analysis of SNMP on a TLS/TCP base,” in Proceedings of the 7th IEEE/IFIP International Symposium on Integrated Network Management, IM 2001, pp. 453–466, Seattle, WA, USA, May 2001. View at Publisher · View at Google Scholar · View at Scopus
  30. Y. Xiao, H.-H. Chen, X. Du, and M. Guizani, “Stream-based cipher feedback mode in wireless error channel,” IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp. 622–626, 2009. View at Publisher · View at Google Scholar · View at Scopus
  31. X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, “An effective key management scheme for heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24–34, 2007. View at Publisher · View at Google Scholar · View at Scopus
  32. X. Yao, X. Han, X. Du, and X. Zhou, “A lightweight multicast authentication mechanism for small scale IoT applications,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3693–3701, 2013. View at Publisher · View at Google Scholar · View at Scopus