Compact aggregate short-lived signatures for consortium consensus protocols

Sherif M. Samir, H. K. Mohamed, Hazem Said
{"title":"Compact aggregate short-lived signatures for consortium consensus protocols","authors":"Sherif M. Samir, H. K. Mohamed, Hazem Said","doi":"10.1109/ICCES48960.2019.9068157","DOIUrl":null,"url":null,"abstract":"Cryptography and cryptographic primitives are widely considered to be the most important fundamental of blockchain that provide secure and anonymity guaranteed decentralized solutions. In the history of papers study cryptographic primitives used in blockchain, the focus has always been in the use cases of blockchain in different aspects of industry, example health care, IoT, information security, consensus building systems and some other fields. To the best of our knowledge, current cryptography techniques used in blockchain, or still theoretical but the security proof can be proven under certain security assumption, so can be used in blockchain has gathered numerous awareness in the last five years. In this paper, we fully review and analysis some cryptographic techniques used in designing a distributed consensus protocol that is efficient, decentralized, and flexible as a framework which are already used in blockchain. Take in consideration deploying a permissioned consensus like delegated proof-of-stack (DPoS) in the decentralized IOT applications is hard. The IOT systems needs to consider a larger data size and a larger span deployment. With this in mind we point to the special challenge for the IOT applications related to blockchain. Several modern cryptography techniques have been adopted to enhance the consensus process with respect to the computational overhead vs communication overhead and storage cost. Additionally, we re-examine non-interactive signature and public key aggregation in digital signature on different messages types and present a change in the aggregation scheme, as far as we know this is the first time that pairing become more faster in verify signatures, and to enable more transaction in the block.","PeriodicalId":136643,"journal":{"name":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 14th International Conference on Computer Engineering and Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES48960.2019.9068157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cryptography and cryptographic primitives are widely considered to be the most important fundamental of blockchain that provide secure and anonymity guaranteed decentralized solutions. In the history of papers study cryptographic primitives used in blockchain, the focus has always been in the use cases of blockchain in different aspects of industry, example health care, IoT, information security, consensus building systems and some other fields. To the best of our knowledge, current cryptography techniques used in blockchain, or still theoretical but the security proof can be proven under certain security assumption, so can be used in blockchain has gathered numerous awareness in the last five years. In this paper, we fully review and analysis some cryptographic techniques used in designing a distributed consensus protocol that is efficient, decentralized, and flexible as a framework which are already used in blockchain. Take in consideration deploying a permissioned consensus like delegated proof-of-stack (DPoS) in the decentralized IOT applications is hard. The IOT systems needs to consider a larger data size and a larger span deployment. With this in mind we point to the special challenge for the IOT applications related to blockchain. Several modern cryptography techniques have been adopted to enhance the consensus process with respect to the computational overhead vs communication overhead and storage cost. Additionally, we re-examine non-interactive signature and public key aggregation in digital signature on different messages types and present a change in the aggregation scheme, as far as we know this is the first time that pairing become more faster in verify signatures, and to enable more transaction in the block.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用于财团协商一致协议的紧凑聚合短寿命签名
密码学和密码学原语被广泛认为是区块链最重要的基础,提供了安全和匿名保证的去中心化解决方案。在研究区块链中使用的密码原语的论文历史中,重点一直放在区块链在不同行业方面的用例上,例如医疗保健、物联网、信息安全、共识构建系统等领域。据我们所知,目前用于区块链的加密技术,还是理论性的,但其安全性证明可以在一定的安全假设下证明,因此可以用于区块链在过去的五年里已经聚集了众多的意识。在本文中,我们全面回顾和分析了用于设计分布式共识协议的一些加密技术,该协议作为已经在区块链中使用的框架,具有高效,分散和灵活的特点。考虑到在分散的物联网应用程序中部署像委托堆栈证明(DPoS)这样的许可共识是困难的。物联网系统需要考虑更大的数据量和更大的跨度部署。考虑到这一点,我们指出了与区块链相关的物联网应用的特殊挑战。在计算开销、通信开销和存储成本方面,采用了几种现代加密技术来增强共识过程。此外,我们重新研究了不同消息类型的数字签名中的非交互式签名和公钥聚合,并提出了聚合方案的变化,据我们所知,这是第一次在验证签名时配对变得更快,并且在块中启用更多的事务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Social Networking Sites (SNS) and Digital Communication Across Nations Improving Golay Code Using Hashing Technique Alzheimer's Disease Integrated Ontology (ADIO) Session PC: Parallel and Cloud Computing Multipath Traffic Engineering for Software Defined Networking
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1