Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing

Zhiwei Wang,Jiaxing Fan
DOI: https://doi.org/10.1109/tcc.2020.2974954
IF: 5.697
2020-01-01
IEEE Transactions on Cloud Computing
Abstract:Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing. Any request sent from an edge server requesting data storage is a transaction added into the blockchain, which should include the data owners' signature. For protecting the privacy of data owners, a threshold ring signature can be utilized for the blockchain. In this article, we propose a flexible threshold ring signature scheme in chronological order that has two advantages for solving the update problem and chronological problem in practice. Our scheme is a nontrivial extension of Yuen et al.'s signature scheme and has three security properties: unforgeability, anonymity, and chronological sorting. We prove our scheme without random oracles and test our scheme over the Intel Edison development platform simulating practical edge servers.
computer science, information systems, theory & methods
What problem does this paper attempt to address?