CLC number: TP309
On-line Access: 2025-06-04
Received: 2024-05-27
Revision Accepted: 2024-10-10
Crosschecked: 2025-06-04
Cited: 0
Clicked: 521
Huifang YU, Mengjie HUANG. Anti-quantum cross-chain identity authentication approach using dynamic group signature[J]. Frontiers of Information Technology & Electronic Engineering, 2025, 26(5): 742-752.
@article{title="Anti-quantum cross-chain identity authentication approach using dynamic group signature",
author="Huifang YU, Mengjie HUANG",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="26",
number="5",
pages="742-752",
year="2025",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2400443"
}
%0 Journal Article
%T Anti-quantum cross-chain identity authentication approach using dynamic group signature
%A Huifang YU
%A Mengjie HUANG
%J Frontiers of Information Technology & Electronic Engineering
%V 26
%N 5
%P 742-752
%@ 2095-9184
%D 2025
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2400443
TY - JOUR
T1 - Anti-quantum cross-chain identity authentication approach using dynamic group signature
A1 - Huifang YU
A1 - Mengjie HUANG
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 26
IS - 5
SP - 742
EP - 752
%@ 2095-9184
Y1 - 2025
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2400443
Abstract: To solve the privacy leakage and identity island problems in cross-chain interaction, we propose an anti-quantum cross-chain identity authentication approach based on dynamic group signature (DGS-AQCCIDAA) for smart education. The relay-based cross-chain model promotes interconnection in heterogeneous consortium blockchains. DGS is used as the endorsement strategy for cross-chain identity authentication. Our approach can ensure quantum security under the learning with error (LWE) and inhomogeneous small integer solution (ISIS) assumptions, and it uses non-interactive zero-knowledge proof (NIZKP) to protect user identity privacy. Our scheme has low calculation overhead and provides anonymous cross-chain identity authentication in the smart education system.
[1]Bellare M, Neven G, 2006. Multi-signatures in the plain public-key model and a general forking lemma. Proc 13th ACM Conf on Computer and Communications Security, p.390-399.
[2]Boneh D, Shacham H, 2004. Group signatures with verifier-local revocation. Proc 11th ACM Conf on Computer and Communications Security, p.168-177.
[3]Gordon DS, Katz J, Vaikuntanathan V, 2010. A group signature scheme from lattice assumptions. 16th Int Conf on the Theory and Application of Cryptology and Information Security on Advances in Cryptology, p.395-412.
[4]He QW, Lin QX, Lin H, et al., 2023. Cross-chain-based medical data security sharing scheme. Comput Syst Appl, 32(5):97-104 (in Chinese).
[5]Laguillaumie F, Langlois A, Libert B, et al., 2013. Lattice-based group signatures with logarithmic signature size. 19th Int Conf on the Theory and Application of Cryptology and Information Security on Advances in Cryptology, p.41-61.
[6]Langlois A, Ling S, Nguyen K, et al., 2014. Lattice-based group signature scheme with verifier-local revocation. Proc 17th Int Conf on Public Key Cryptography, p.345-361.
[7]Li XL, Lv XL, Guo LJ, et al., 2019. A dynamic group signature scheme based on lattice for large groups. J Univ Electron Sci Technol China, 48(1):80-87 (in Chinese).
[8]Libert B, Ling S, Mouhartem F, et al., 2016. Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions. 22nd Int Conf on the Theory and Application of Cryptology and Information Security on Advances in Cryptology, p.373-403.
[9]Ling S, Nguyen K, Wang HX, et al., 2017. Lattice-based group signatures: achieving full dynamicity with ease. Proc 15th Int Conf on Applied Cryptography and Network Security, p.293-312.
[10]Liu DY, Zhang JQ, Zhang X, et al., 2024. Cross-chain identity authentication scheme based on certificate-less signcryption. J Comput Appl, 44(12):3731-3740 (in Chinese).
[11]Ma ZF, Wang XC, Jain DK, et al., 2020. A blockchain-based trusted data management scheme in edge computing. IEEE Trans Ind Inform, 16(3):2013-2021.
[12]Nguyen PQ, Zhang J, Zhang ZF, 2015. Simpler efficient group signatures from lattices. 18th IACR Int Conf on Practice and Theory in Public-Key Cryptography, p.401-426.
[13]Shao SS, Chen F, Xiao XY, et al., 2021. IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT. World Wide Web, 24(5):1665-1690.
[14]Wang SS, Ma ZF, Liu JW, et al., 2022a. Research and implementation of cross-chain security access and identity authentication scheme of blockchain. Netinfo Secur, 22(6):61-72 (in Chinese).
[15]Wang SS, Dai BR, Zhu ML, et al., 2022b. User identity authentication model for cross-chain system. Comput Eng Appl, 58(19):135-141 (in Chinese).
[16]Yang C, Li JW, Li HW, et al., 2019. A research on heterogeneous identity alliance unified identity model. Inform Secur Commun Secur, (6):27-35 (in Chinese).
[17]Yu HF, Bai XP, 2024. Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system. Front Inform Technol Electron Eng, 25(3):461-471.
[18]Yu HF, Mu WZ, 2024. ABE-based postquantum cross-blockchain data exchange approach for smart agriculture. IEEE Trans Ind Inform, 20(10):12083-12091.
[19]Yu HF, Zhang Q, Li L, 2023. Certificateless anti-quantum blind signcryption for e-cash. J Ind Inform Integr, 40:100632.
[20]Zhong T, Shi PC, Chang JS, 2021. JointCloud cross-chain verification model of decentralized identifiers. IEEE Int Performance, Computing, and Communications Conf, p.1-8.
Open peer comments: Debate/Discuss/Question/Opinion
<1>