Share this post on:

The computational0Desfuroylceftiofur References overhead total quantity of nodes is rising from 0 to 200. Even so, growing from to 200. Having said that, the computational be a rising polynomial. As a result, our proposed process can of the other two techniques will overhead on the other two solutions will probably be a increasing polynomial. For that reason, our scalability than the can offer greater blockchain [31] as well as the provide superior blockchain proposed method quantum blind dual-signature scalability lattice-based multi-signature solutions [16,17]. Additionally, a lot more signature algorithms are compared right here, and the performance indicators for comparison contain the quantum intercept-resend (QIR) attacks, quantum man-in-the-middle (QMITM) attacks, blind message, number of signatures, signature complexity, and verification complexity. The compared schemes include things like the lattice-based signature [102], lattice-based blind signature [9,26], lattice-based multi-signature [16,17], quantum signature [13], quantum Fourier transfer [14], quantum blind signature [15], arbitrated quantum blind dual-signature [31], and our proposed framework in this paper. It truly is assumed that p is actually a prime inside a k-dimensional lattice with m components, exactly where m = poly(k). Assuming you will find n qubits to kind a quantum important for quantum signature or n bits to type a classic key for classic signature, the comparison benefits of diverse signature algorithms are shown in Table two.Entropy 2021, 23,15 ofTable 2. The comparative evaluation of unique safe schemes. Model Lattice-based signature [102] Lattice-based blind signature [9,26] Lattice-based multi-signature [16,17] Quantum signature [13] Quantum Fourier transfer [14] Quantum blind signature [15] Quantum blind dual-signature [31] Our proposed strategy QIR Attacks Probabilistic Probabilistic Probabilistic Non-cloning Non-cloning Non-cloning Non-cloning Non-cloning QMITM Attacks Probabilistic Probabilistic Probabilistic Non-cloning Non-cloning Non-cloning Non-cloning Non-cloning Blind Message No Blind No No Blind Blind Blind Blind Number of Signatures 1 1 Signature Complexity O(mkn log p) O(mkn log p) O(mkn log p) O(n) O ( n2) O ( n2) O ( n2) O(n) Verification Complexity O(m2 n log p) O(m2 n log p) O(m2 n log p) O(n) O ( n2) O ( n2) O ( n2) O(n)1 1 1Based on the above comparison outcomes, we can see that: (1) Facing the security threaten from quantum technologies [3,4], the proposed framework can deliver absolute anti-quantum security through the quantum non-cloning theorem. On the other hand, the classic anti-quantum technologies [92,16,17,26] can only provide probabilistic quantum resistance with complex algorithms. (2) Our proposed approach, the lattice-based multi-signature scheme [16,17] as well as the arbitrated quantum blind dual-signature [31] model can offer multi-signature operation for multi-party transactions within a blockchain. Nevertheless, the other schemes can only deliver a Solvent violet 9 Technical Information single signature [95,26] along with the arbitrated quantum blind dual-signature [31] model is unsuitable for multi-party transactions in industrial blockchains. (3) Our proposed scheme, the classic blind signature schemes [9,26], and quantum blind signature techniques [15,31] use blind operation around the transaction message, and can be employed for privacy protection of multi-party transactions inside a blockchain. Even so, other techniques [104,16,17] can’t deliver blind privacy protection. (four) Compared with all the classic anti-quantum schemes [92,16,17,26] depending on solving complexity and also other quantum signature algorithms [135,31], our proposed.

Share this post on:

Author: Interleukin Related