期刊论文详细信息
IEEE Access
A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain
Ying Sun1  Yu-Ling Chen2  Yu-Long Gao3  Xiu-Bo Chen3  Yi-Xian Yang3  Xin-Xin Niu3 
[1] Beijing Electronic Science and Technology Institute, Beijing, China;Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, China;State Key Laboratory of Networking and Switching Technology, Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China;
关键词: Blockchain;    post-quantum;    lattice;    cryptocurrency;    security;   
DOI  :  10.1109/ACCESS.2018.2827203
来源: DOAJ
【 摘 要 】

Nowadays, blockchain has become one of the most cutting-edge technologies, which has been widely concerned and researched. However, the quantum computing attack seriously threatens the security of blockchain, and related research is still less. Targeting at this issue, in this paper, we present the definition of post-quantum blockchain (PQB) and propose a secure cryptocurrency scheme based on PQB, which can resist quantum computing attacks. First, we propose a signature scheme based on lattice problem. We use lattice basis delegation algorithm to generate secret keys with selecting a random value, and sign message by preimage sampling algorithm. In addition, we design the first-signature and last-signature in our scheme, which are defined as double-signature. It is used to reduce the correlation between the message and the signature. Second, by combining the proposed signature scheme with blockchain, we construct the PQB and propose this cryptocurrency scheme. Its security can be reduced to the lattice short integer solution (SIS) problem. At last, through our analysis, the proposed cryptocurrency scheme is able to resist the quantum computing attack and its signature satisfies correctness and one-more unforgeability under the lattice SIS assumption. Furthermore, compared with previous signature schemes, the sizes of signature and secret keys are relatively shorter than that of others, which can decrease the computational complexity. These make our cryptocurrency scheme more secure and efficient.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:3次