I. Introduction
As one of the core technologies of cryptography, digital signature [1] can provide authenticity, integrity, and undeniable services for information. However, due to the defect that the original signature becomes invalid once the message is changed, the general digital signature scheme cannot be used to solve the problem of pollution attacks in network coding. In the way of studying how to solve the pollution attack problem based on the public key method, scholars have proposed a series of signature schemes with linear homomorphism in turn [2] –[5]. However, these signature schemes do not formally define linearly homomorphic signature scheme (LHSS) and cannot sign multiple files with the same public key in the schemes. Until 2009, the work of Boneh et al. [6] filled these gaps. In an LHSS, for l message-signature pairs , any entities can obtain the legal signature of the message only by calculating without knowing the signer’s private key. Today, the main applications of LHSS include network coding, electronic health systems [7], block chains [8], and the Internet of things [9].