Designated confirmer threshold signature and its applications in blockchains
Abstract The non-transferability of a designated confirmer signature scheme allows a signer to control the verification ability of a signature, hence protecting the signer’s privacy. However, a designated confirmer signature is insufficient when the secret keys are damaged and incapable of collabora...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2024-12-01
|
| Series: | Cybersecurity |
| Subjects: | |
| Online Access: | https://doi.org/10.1186/s42400-024-00256-2 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850253847183753216 |
|---|---|
| author | Yunfeng Ji Rui Zhang Yang Tao Birou Gao |
| author_facet | Yunfeng Ji Rui Zhang Yang Tao Birou Gao |
| author_sort | Yunfeng Ji |
| collection | DOAJ |
| description | Abstract The non-transferability of a designated confirmer signature scheme allows a signer to control the verification ability of a signature, hence protecting the signer’s privacy. However, a designated confirmer signature is insufficient when the secret keys are damaged and incapable of collaborative signature generation. In this paper, we circumvent these limitations by introducing the notion of designated confirmer threshold signature. First, we present a formal security model, then give a generic construction, which utilizes threshold signature schemes, encryption schemes and $$\Sigma$$ Σ -protocols. Instantiating this generic construction, we have two specific schemes, based on threshold Schnorr and threshold ECDSA, respectively. We further design two efficient $$\Sigma$$ Σ -protocols for efficient proofs. We also implement these schemes, and the experiment results show that our schemes are practical with rich functionalities. Finally, we demonstrate interesting applications for blockchains, such as verifiable asset auctions in blockchain and traditional electronic bidding. |
| format | Article |
| id | doaj-art-a1c8dcd1b9fc487694af5c7bf7db7911 |
| institution | OA Journals |
| issn | 2523-3246 |
| language | English |
| publishDate | 2024-12-01 |
| publisher | SpringerOpen |
| record_format | Article |
| series | Cybersecurity |
| spelling | doaj-art-a1c8dcd1b9fc487694af5c7bf7db79112025-08-20T01:57:16ZengSpringerOpenCybersecurity2523-32462024-12-017111510.1186/s42400-024-00256-2Designated confirmer threshold signature and its applications in blockchainsYunfeng Ji0Rui Zhang1Yang Tao2Birou Gao3School of Modern Information Technology, Zhejiang Institute of Mechanical and Electrical EngineeringState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of SciencesState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of SciencesSchool of Modern Information Technology, Zhejiang Institute of Mechanical and Electrical EngineeringAbstract The non-transferability of a designated confirmer signature scheme allows a signer to control the verification ability of a signature, hence protecting the signer’s privacy. However, a designated confirmer signature is insufficient when the secret keys are damaged and incapable of collaborative signature generation. In this paper, we circumvent these limitations by introducing the notion of designated confirmer threshold signature. First, we present a formal security model, then give a generic construction, which utilizes threshold signature schemes, encryption schemes and $$\Sigma$$ Σ -protocols. Instantiating this generic construction, we have two specific schemes, based on threshold Schnorr and threshold ECDSA, respectively. We further design two efficient $$\Sigma$$ Σ -protocols for efficient proofs. We also implement these schemes, and the experiment results show that our schemes are practical with rich functionalities. Finally, we demonstrate interesting applications for blockchains, such as verifiable asset auctions in blockchain and traditional electronic bidding.https://doi.org/10.1186/s42400-024-00256-2Designated confirmer signatureThreshold signature$$\Sigma$$ Σ -ProtocolBlockchain |
| spellingShingle | Yunfeng Ji Rui Zhang Yang Tao Birou Gao Designated confirmer threshold signature and its applications in blockchains Cybersecurity Designated confirmer signature Threshold signature $$\Sigma$$ Σ -Protocol Blockchain |
| title | Designated confirmer threshold signature and its applications in blockchains |
| title_full | Designated confirmer threshold signature and its applications in blockchains |
| title_fullStr | Designated confirmer threshold signature and its applications in blockchains |
| title_full_unstemmed | Designated confirmer threshold signature and its applications in blockchains |
| title_short | Designated confirmer threshold signature and its applications in blockchains |
| title_sort | designated confirmer threshold signature and its applications in blockchains |
| topic | Designated confirmer signature Threshold signature $$\Sigma$$ Σ -Protocol Blockchain |
| url | https://doi.org/10.1186/s42400-024-00256-2 |
| work_keys_str_mv | AT yunfengji designatedconfirmerthresholdsignatureanditsapplicationsinblockchains AT ruizhang designatedconfirmerthresholdsignatureanditsapplicationsinblockchains AT yangtao designatedconfirmerthresholdsignatureanditsapplicationsinblockchains AT birougao designatedconfirmerthresholdsignatureanditsapplicationsinblockchains |