{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:03:46Z","timestamp":1760148226987,"version":"build-2065373602"},"reference-count":40,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T00:00:00Z","timestamp":1681257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2021YFA1000600","12171114"],"award-info":[{"award-number":["2021YFA1000600","12171114"]}]},{"name":"National Natural Science Foundation of China","award":["2021YFA1000600","12171114"],"award-info":[{"award-number":["2021YFA1000600","12171114"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Digital signature technology is essential for ensuring the authenticity and unforgeability of transactions in a private blockchain framework. In some scenarios, transactions require verification from multiple parties, each of whom needs to authenticate different parts of the transaction. To address this issue, researchers have developed multi-party ECDSA (Elliptic Curve Digital Signature Algorithm) signature schemes. However, these schemes either need to consider the authentication of different parts of the transaction or generate an aggregated signature. This paper proposes a novel solution that combines functional signatures and multi-party ECDSA signatures to create a multi-party functional signature for private blockchains. Compared to previous constructions, the proposed scheme ensures that each part of the transaction is verified. Furthermore, when the aggregate signature of the entire transaction cannot be verified, this scheme identifies the specific part of the transaction for which the signature authentication fails instead of rejecting the entire transaction. This paper uses a smart contract to securely deploy the proposed scheme and authenticate the f in functional signatures. The constructed scheme also provides security under the existential unforgeability of the ECDSA signature, even if n\u22121 parties are corrupted, assuming a total of n parties. The scheme of this paper successfully conducted experiments on a personal computer, with three users taking approximately 343 ms, six users taking 552 ms, and nine users taking 791 ms.<\/jats:p>","DOI":"10.3390\/cryptography7020021","type":"journal-article","created":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T01:35:00Z","timestamp":1681349700000},"page":"21","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Multi-Party Functional Signatures Scheme for Private Blockchain"],"prefix":"10.3390","volume":"7","author":[{"given":"Quan","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Yulong","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Kaijun","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Minhui","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1494-9148","authenticated-orcid":false,"given":"Zhikang","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1002\/jcaf.22179","article-title":"Blockchain and its coming impact on financial services","volume":"27","author":"Fanning","year":"2016","journal-title":"J. Corp. Account. Financ."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Nguyen, Q.K. (2016, January 24\u201325). Blockchain-a financial technology for future sustainable development. Proceedings of the 2016 3rd International Conference on Green Technology and Sustainable Development (GTSD), Kaohsiung, Taiwan.","DOI":"10.1109\/GTSD.2016.22"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MC.2017.3571047","article-title":"Blockchain technology in finance","volume":"50","author":"Treleaven","year":"2017","journal-title":"Computer"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"103050","DOI":"10.1016\/j.jnca.2021.103050","article-title":"Blockchain based solutions to secure IoT: Background, integration trends and a way forward","volume":"181","author":"Saxena","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Shaukat, K., Alam, T.M., Hameed, I.A., Khan, W.A., Abbas, N., and Luo, S. (2021, January 2\u20134). A review on security challenges in internet of things (IoT). Proceedings of the 2021 26th International Conference on Automation and Computing (ICAC), Portsmouth, UK.","DOI":"10.23919\/ICAC50006.2021.9594183"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"102656","DOI":"10.1016\/j.jnca.2020.102656","article-title":"Blockchain-based decentralized storage networks: A survey","volume":"162","author":"Benisi","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/ACCESS.2020.3046931","article-title":"What is core and what future holds for blockchain technologies and cryptocurrencies: A bibliometric analysis","volume":"9","author":"Nasir","year":"2020","journal-title":"IEEE Access"},{"key":"ref_8","unstructured":"Nakamoto, S., and Bitcoin, A. (2008). A peer-to-peer electronic cash system. Bitcoin, 4. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_9","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"ref_10","unstructured":"Shaukat, K., Alam, T.M., Luo, S., Shabbir, S., Hameed, I.A., Li, J., Abbas, S.K., and Javed, U. (2021). Advances in Information and Communication: Proceedings of the 2021 Future of Information and Communication Conference (FICC), Springer International Publishing."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"274","DOI":"10.3991\/ijet.v16i03.18851","article-title":"A review of content-based and context-based recommendation systems","volume":"16","author":"Javed","year":"2021","journal-title":"Int. J. Emerg. Technol. Learn."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"106030","DOI":"10.1016\/j.engappai.2023.106030","article-title":"A novel deep learning-based approach for malware detection","volume":"122","author":"Shaukat","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.inffus.2021.09.021","article-title":"Mass customized\/personalized manufacturing in Industry 4.0 and blockchain: Research challenges, main problems, and the design of an information architecture","volume":"79","author":"Perez","year":"2022","journal-title":"Inf. Fusion"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"6605","DOI":"10.1109\/ACCESS.2021.3140091","article-title":"Systematic review of security vulnerabilities in ethereum blockchain smart contract","volume":"10","author":"Kushwaha","year":"2022","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"105461","DOI":"10.1016\/j.engappai.2022.105461","article-title":"A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks","volume":"116","author":"Shaukat","year":"2022","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Boyle, E., Goldwasser, S., and Ivan, I. (2014, January 26\u201328). Functional signatures and pseudorandom functions. Proceedings of the Public-Key Cryptography\u2013PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina. Proceedings 17.","DOI":"10.1007\/978-3-642-54631-0_29"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Backes, M., Meiser, S., and Schr\u00f6der, D. (2016, January 6\u20139). Delegatable functional signatures. Proceedings of the Public-Key Cryptography\u2013PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan. Proceedings, Part I.","DOI":"10.1007\/978-3-662-49384-7_14"},{"key":"ref_18","unstructured":"Okamoto, T., and Takashima, K. (March, January 26). Decentralized Attribute-Based Signatures. Proceedings of the Public Key Cryptography, Nara, Japan."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/MNET.011.2000467","article-title":"AutoD: Intelligent blockchain application unpacking based on JNI layer deception call","volume":"35","author":"Lu","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"MacKenzie, P., and Reiter, M.K. (2001, January 19\u201323). Two-party generation of DSA signatures. Proceedings of the Advances in Cryptology\u2013CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, CA, USA. Proceedings 21.","DOI":"10.1007\/3-540-44647-8_8"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Lindell, Y. (2017, January 20\u201324). Fast secure two-party ECDSA signing. Proceedings of the Advances in Cryptology\u2013CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA. Proceedings, Part II 37.","DOI":"10.1007\/978-3-319-63715-0_21"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Castagnos, G., Catalano, D., Laguillaumie, F., Savasta, F., and Tucker, I. (2019, January 18\u201322). Two-party ECDSA from hash proof systems and efficient instantiations. Proceedings of the Advances in Cryptology\u2013CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA. Proceedings, Part III 39.","DOI":"10.1007\/978-3-030-26954-8_7"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Lindell, Y., and Nof, A. (2018, January 15\u201319). Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243788"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Doerner, J., Kondi, Y., Lee, E., and Shelat, A. (2019, January 19\u201323). Threshold ECDSA from ECDSA assumptions: The multiparty case. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00024"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Gennaro, R., and Goldfeder, S. (2018, January 15\u201319). Fast multiparty threshold ECDSA with fast trustless setup. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243859"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Chen, S., Liu, D., and Li, J. (2020). Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies, 13.","DOI":"10.3390\/en13102509"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"222310","DOI":"10.1109\/ACCESS.2020.3041951","article-title":"A survey on machine learning techniques for cyber security in the last decade","volume":"8","author":"Shaukat","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Halpin, H., and Piekarska, M. (2017, January 26\u201328). Introduction to Security and Privacy on the Blockchain. Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Paris, France.","DOI":"10.1109\/EuroSPW.2017.43"},{"key":"ref_29","first-page":"3872","article-title":"Puncturable signatures and applications in proof-of-stake blockchain protocols","volume":"15","author":"Li","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Guo, R., Gan, G., and Tsai, W.T. (2016, January 10\u201314). Interactive incontestable signature for transactions confirmation in bitcoin blockchain. Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA.","DOI":"10.1109\/COMPSAC.2016.142"},{"key":"ref_31","unstructured":"Mercer, R. (2016). Privacy on the blockchain: Unique ring signatures. arXiv."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.future.2021.09.020","article-title":"Anonymous traceability protocol based on group signature for blockchain","volume":"127","author":"Gong","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_33","unstructured":"Kokoris Kogias, E., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., and Ford, B. (2016). Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing, USENIX Association."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Zhou, X., Wu, Q., Qin, B., Huang, X., and Liu, J. (2016, January 23\u201326). Distributed bitcoin account management. Proceedings of the 2016 IEEE Trustcom\/BigDataSE\/ISPA, Tianjin, China.","DOI":"10.1109\/TrustCom.2016.0052"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Alangot, B., Suresh, M., Raj, A.S., Pathinarupothi, R.K., and Achuthan, K. (2018, January 18\u201321). Reliable collective cosigning to scale blockchain with strong consistency. Proceedings of the Network and Distributed System Security Symposium (DISS\u201918), San Diego, CA, USA.","DOI":"10.14722\/diss.2018.23005"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1550147718815842","DOI":"10.1177\/1550147718815842","article-title":"Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain","volume":"14","author":"Yu","year":"2018","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2139","DOI":"10.1007\/s10623-019-00608-x","article-title":"Simple schnorr multi-signatures with applications to bitcoin","volume":"87","author":"Maxwell","year":"2019","journal-title":"Des. Codes Cryptogr."},{"key":"ref_38","first-page":"103345","article-title":"Elliptic curve threshold signature scheme for blockchain","volume":"70","author":"Yu","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1782","DOI":"10.1109\/TIFS.2020.3042070","article-title":"Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform","volume":"16","author":"Xiao","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"641","DOI":"10.32604\/csse.2023.028341","article-title":"Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency","volume":"45","author":"Uganya","year":"2023","journal-title":"Comput. Syst. Sci. Eng."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/21\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:15:02Z","timestamp":1760123702000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,12]]},"references-count":40,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["cryptography7020021"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7020021","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2023,4,12]]}}}