FOLLOWUS
1.School of Cyberspace Security, Xi’an University of Posts & Telecommunications, Xi’an 710121, China
2.Ministry of Education Key Laboratory of Cyberspace Security, Information Engineering University, Zhengzhou 450001, China
‡ Corresponding author
Received:27 May 2024,
Revised:10 October 2024,
Published:2025-05
Scan QR Code
Huifang YU, Mengjie HUANG. Anti-quantum cross-chain identity authentication approach using dynamic group signature[J]. Frontiers of information technology & electronic engineering, 2025, 26(5): 742-752.
Huifang YU, Mengjie HUANG. Anti-quantum cross-chain identity authentication approach using dynamic group signature[J]. Frontiers of information technology & electronic engineering, 2025, 26(5): 742-752. DOI: 10.1631/FITEE.2400443.
To solve the privacy leakage and identity island problems in cross-chain interaction
we propose an anti-quantum cross-chain identity authentication approach based on dynamic group signature (DGS-AQCCIDAA) for smart education. The relay-based cross-chain model promotes interconnection in heterogeneous consortium blockchains. DGS is used as the endorsement strategy for cross-chain identity authentication. Our approach can ensure quantum security under the learning with error (LWE) and inhomogeneous small integer solution (ISIS) assumptions
and it uses non-interactive zero-knowledge proof (NIZKP) to protect user identity privacy. Our scheme has low calculation overhead and provides anonymous cross-chain identity authentication in the smart education system.
Bellare M , Neven G , 2006 . Multi-signatures in the plain public-key model and a general forking lemma . Proc 13 th ACM Conf on Computer and Communications Security , p. 390 - 399 . https://doi.org/10.1145/1180405.1180453 https://doi.org/10.1145/1180405.1180453
Boneh D , Shacham H , 2004 . Group signatures with verifier-local revocation . Proc 11 th ACM Conf on Computer and Communications Security , p. 168 - 177 . https://doi.org/10.1145/1030083.103010 https://doi.org/10.1145/1030083.103010
Gordon DS , Katz J , Vaikuntanathan V , 2010 . A group signature scheme from lattice assumptions . 16 th Int Conf on the Theory and Application of Cryptology and Information Security on Advances in Cryptology , p. 395 - 412 . https://doi.org/10.1007/978-3-642-17373-8_23 https://doi.org/10.1007/978-3-642-17373-8_23
He QW , Lin QX , Lin H , et al. , 2023 . Cross-chain-based medical data security sharing scheme . Comput Syst Appl , 32 ( 5 ): 97 - 104 (in Chinese) . https://doi.org/10.15888/j.cnki.csa.009087 https://doi.org/10.15888/j.cnki.csa.009087
Laguillaumie F , Langlois A , Libert B , et al. , 2013 . Lattice-based group signatures with logarithmic signature size . 19 th Int Conf on the Theory and Application of Cryptology and Information Security on Advances in Cryptology , p. 41 - 61 . https://doi.org/10.1007/978-3-642-42045-0_3 https://doi.org/10.1007/978-3-642-42045-0_3
Langlois A , Ling S , Nguyen K , et al. , 2014 . Lattice-based group signature scheme with verifier-local revocation . Proc 17 th Int Conf on Public Key Cryptography , p. 345 - 361 . https://doi.org/10.1007/978-3-642-54631-0_20 https://doi.org/10.1007/978-3-642-54631-0_20
Li XL , Lv XL , Guo LJ , et al. , 2019 . A dynamic group signature scheme based on lattice for large groups . J Univ Electron Sci Technol China , 48 ( 1 ): 80 - 87 (in Chinese) . https://doi.org/10.3969/j.issn.1001-0548.2019.01.014 https://doi.org/10.3969/j.issn.1001-0548.2019.01.014
Libert B , Ling S , Mouhartem F , et al. , 2016 . Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions . 22 nd Int Conf on the Theory and Application of Cryptology and Information Security on Advances in Cryptology , p. 373 - 403 . https://doi.org/10.1007/978-3-662-53890-6_13 https://doi.org/10.1007/978-3-662-53890-6_13
Ling S , Nguyen K , Wang HX , et al. , 2017 . Lattice-based group signatures: achieving full dynamicity with ease . Proc 15 th Int Conf on Applied Cryptography and Network Security , p. 293 - 312 . https://doi.org/10.1007/978-3-319-61204-1_15 https://doi.org/10.1007/978-3-319-61204-1_15
Liu DY , Zhang JQ , Zhang X , et al. , 2024 . Cross-chain identity authentication scheme based on certificate-less signcryption . J Comput Appl , 44 ( 12 ): 3731 - 3740 (in Chinese) . https://doi.org/10.11772/j.issn.1001-9081.2023121824 https://doi.org/10.11772/j.issn.1001-9081.2023121824
Ma ZF , Wang XC , Jain DK , et al. , 2020 . A blockchain-based trusted data management scheme in edge computing . IEEE Trans Ind Inform , 16 ( 3 ): 2013 - 2021 . https://doi.org/10.1109/TII.2019.2933482 https://doi.org/10.1109/TII.2019.2933482
Nguyen PQ , Zhang J , Zhang ZF , 2015 . Simpler efficient group signatures from lattices . 18 th IACR Int Conf on Practice and Theory in Public-Key Cryptography , p. 401 - 426 . https://doi.org/10.1007/978-3-662-46447-2_18 https://doi.org/10.1007/978-3-662-46447-2_18
Shao SS , Chen F , Xiao XY , et al. , 2021 . IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT . World Wide Web , 24 ( 5 ): 1665 - 1690 . https://doi.org/10.1007/s11280-021-00864-9 https://doi.org/10.1007/s11280-021-00864-9
Wang SS , Ma ZF , Liu JW , et al. , 2022a . Research and implementation of cross-chain security access and identity authentication scheme of blockchain . Netinfo Secur , 22 ( 6 ): 61 - 72 (in Chinese) . https://doi.org/10.3969/j.issn.1671-1122.2022.06.007 https://doi.org/10.3969/j.issn.1671-1122.2022.06.007
Wang SS , Dai BR , Zhu ML , et al. , 2022b . User identity authentication model for cross-chain system . Comput Eng Appl , 58 ( 19 ): 135 - 141 (in Chinese) . https://doi.org/10.3778/j.issn.1002-8331.2107-0251 https://doi.org/10.3778/j.issn.1002-8331.2107-0251
Yang C , Li JW , Li HW , et al. , 2019 . A research on heterogeneous identity alliance unified identity model . Inform Secur Commun Secur , ( 6 ): 27 - 35 (in Chinese) . https://doi.org/10.3969/j.issn.1009-8054.2019.06.006 https://doi.org/10.3969/j.issn.1009-8054.2019.06.006
Yu HF , Bai XP , 2024 . Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system . Front Inform Technol Electron Eng , 25 ( 3 ): 461 - 471 . https://doi.org/10.1631/FITEE.2300248 https://doi.org/10.1631/FITEE.2300248
Yu HF , Mu WZ , 2024 . ABE-based postquantum cross-blockchain data exchange approach for smart agriculture . IEEE Trans Ind Inform , 20 ( 10 ): 12083 - 12091 . https://doi.org/10.1109/TII.2024.3413684 https://doi.org/10.1109/TII.2024.3413684
Yu HF , Zhang Q , Li L , 2023 . Certificateless anti-quantum blind signcryption for e-cash . J Ind Inform Integr , 40 : 100632 . https://doi.org/10.1016/j.jii.2024.100632 https://doi.org/10.1016/j.jii.2024.100632
Zhong T , Shi PC , Chang JS , 2021 . JointCloud cross-chain verification model of decentralized identifiers . IEEE Int Performance, Computing, and Communications Conf , p. 1 - 8 . https://doi.org/10.1109/IPCCC51483.2021.9679363 https://doi.org/10.1109/IPCCC51483.2021.9679363
Publicity Resources
Related Articles
Related Author
Related Institution