区块链

可审计且可追踪的区块链匿名交易方案

展开
  • 北京交通大学 电子信息工程学院, 北京 100044

收稿日期: 2020-10-31

  网络出版日期: 2021-02-04

基金资助

国家重点研发计划基金(No.2018YFC0832300,No.2018YFC0832303);国家自然科学基金面上项目(No.61472032)资助

Auditable and Traceable Blockchain Anonymous Transaction Scheme

Expand
  • School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China

Received date: 2020-10-31

  Online published: 2021-02-04

摘要

近年来随着对区块链交易隐私保护的加强,审计区块链交易和追踪非法交易者身份变得更加困难。为此,提出可审计且可追踪的区块链匿名交易方案。利用Elgamal加密、数字签名和改进的隐地址等技术来实现交易内容、交易发送方身份和交易接收方身份三方面的隐私保护。引入审计方和监管方两个角色以实现权力分配,当审计方审计到交易双方存在非法交易时,向监管方发送带有签名的追踪身份请求。签名验证通过后,监管方可利用收到的追踪密钥和个人的监管密钥追踪到交易双方的身份。该方案实现了交易的匿名性、可审计性和身份的可追踪性。仿真实验结果表明该方案的审计效率较高。

本文引用格式

赵晓琦, 李勇 . 可审计且可追踪的区块链匿名交易方案[J]. 应用科学学报, 2021 , 39(1) : 29 -41 . DOI: 10.3969/j.issn.0255-8297.2021.01.003

Abstract

In recent years, with the strengthening of privacy protection for blockchain transactions, it has become more difficult to audit blockchain transactions and track the identity of illegal traders. For this reason, an auditable and traceable blockchain anonymous transaction scheme is proposed in this paper. Elgamal encryption, digital signature and improved hidden address technologies are used to realize the privacy protection of the transaction content and the identities of transaction senders and transaction receivers, and realize the distribution of power by introducing two roles of auditor and regulator. When an illegal transaction is audited, auditor sends a tracking identity request with signature to the regulator. After the signature is verified, the regulator can use the received tracking key and the personal key to trace the identities of both parties to the transaction. This scheme satisfies the anonymity, auditability and identity traceability of transactions. Simulation experiment results show the high audit efficiency of the scheme.

参考文献

[1] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2019-9-21] http://bitcoin.org/bitcoin.pdf.
[2] Reid F, Harrigan M. An analysis of anonymity in the Bitcoin system[C]//Proceedings of the 3rd International Conference on Privacy, Security, Risk and Trust, IEEE, 2011:1318-1326.
[3] Katz J. Digital signatures[M]. Berlin:Springer, 2010:3-33.
[4] Noether S. Ring signature confidential transactions for Monero[R/OL]. 2015[2019-11-03]. http://eprint.iacr.org/2015/1098.
[5] Shen N, Mackenzie A, Lab T M. Ring confidential transactions[J]. Ledger, 2016(1):1-18.
[6] Maxwell G. Coinjoin:Bitcoin privacy for the real world[EB/OL]. 2013[2019-11-07]. https://bitcointalk.org/index.php?topic=279249.
[7] Bissias G, Ozisik A P, Levine B N, et al. Sybil-resistant mixing for Bitcoin[C]//Proceedings of the Workshop on Privacy in the Electronic Society, 2014:149-158.
[8] Miers I, Garman C, Green M, et al. Zerocoin:anonymous distributed E-cash from Bitcoin[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2013:397-411.
[9] Sasson E B, Chiesa A, Garman C, et al. Zerocash:decentralized anonymous payments from Bitcoin[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2014:459-474.
[10] Bensasson E, Chiesa A, Genkin D, et al. SNARKs for C:verifying program executions succinctly and in zero knowledge[J]. Lecture Notes in Computer Science, 2013, 8043:90-108.
[11] Wu Y B, Fan H N, Wang X Y, et al. A regulated digital currency[J]. Science China:Information Sciences, 2019, 62(3):032109. https://doi.org/10.1007/s11432-018-9611-3.
[12] Naganuma K, Yoshino M, Sato H, et al. Auditable Zerocoin[C]//IEEE European Symposium on Security and Privacy Workshops. Piscataway, NJ:IEEE Press, 2017:59-63.
[13] Narula N, Vasquez W, Virza M. ZkLedger:privacy-preserving auditing for distributed ledgers[C]//The 15th USENIX Symposium on Networked Systems Design and Implementation, 2018:65-80.
[14] Wüst K, Kostiainen K, Capkun V, et al. PRCash:fast, private and regulated transactions for digital currencies[C]//Financial Cryptography and Data Security. Berlin:Springer, 2019:158-178.
[15] Jedusor T E. Mimblewimble[R/OL].[2019-11-18]. https://download.wpsoftware.net/bitcoin/wizardry/mimblewimble.txt.
[16] Morais E, Koens T, Wijk C, et al. A survey on zero knowledge range proofs and applications[J]. SN Applied Sciences, 2019, 1(8):1-17.
[17] Frankle J, Park S, Shaar D, et al. Practical accountability of secret processes[C]//The 27th USENIX Security Symposium, 2018:657-674.
[18] Saia J, Zamani M. Recent results in scalable multi-party computation[C]//International Conference on Current Trends in Theory and Practice of Informatics. Berlin:Springer, 2015:24-44.
[19] Chen Y, Ma X. PGC:pretty good confidential transaction system with accountability[EB/OL]. 2019[2019-11-18]. https://eprint.iacr.org/2019/319.
[20] Bunz B, Bootle J, Boneh D, et al. Bulletproofs:short proofs for confidential transactions and more[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2018:315-334.
[21] Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4):469-472.
[22] 杨浩淼, 孙世新, 李洪伟. 双线性Diffie-Hellman问题研究[J]. 四川大学学报(工程科学版), 2006(2):137-140. Yang H M, Sun S X, Li H M. Research on bilinear Diffie-Hellman problem[J]. Journal of Sichuan University (Engineering Science Edition), 2006(2):137-140. (in Chinese)
[23] Saberhagen N. Cryptonote v2.0[EB/OL]. 2018[2019-11-20]. https://download.csdn.net/download/cqliuqiang/10459878.
文章导航

/