In recent years, with the strengthening of privacy protection for blockchain transactions, it has become more difficult to audit blockchain transactions and track the identity of illegal traders. For this reason, an auditable and traceable blockchain anonymous transaction scheme is proposed in this paper. Elgamal encryption, digital signature and improved hidden address technologies are used to realize the privacy protection of the transaction content and the identities of transaction senders and transaction receivers, and realize the distribution of power by introducing two roles of auditor and regulator. When an illegal transaction is audited, auditor sends a tracking identity request with signature to the regulator. After the signature is verified, the regulator can use the received tracking key and the personal key to trace the identities of both parties to the transaction. This scheme satisfies the anonymity, auditability and identity traceability of transactions. Simulation experiment results show the high audit efficiency of the scheme.
ZHAO Xiaoqi, LI Yong
. Auditable and Traceable Blockchain Anonymous Transaction Scheme[J]. Journal of Applied Sciences, 2021
, 39(1)
: 29
-41
.
DOI: 10.3969/j.issn.0255-8297.2021.01.003
[1] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2019-9-21] http://bitcoin.org/bitcoin.pdf.
[2] Reid F, Harrigan M. An analysis of anonymity in the Bitcoin system[C]//Proceedings of the 3rd International Conference on Privacy, Security, Risk and Trust, IEEE, 2011:1318-1326.
[3] Katz J. Digital signatures[M]. Berlin:Springer, 2010:3-33.
[4] Noether S. Ring signature confidential transactions for Monero[R/OL]. 2015[2019-11-03]. http://eprint.iacr.org/2015/1098.
[5] Shen N, Mackenzie A, Lab T M. Ring confidential transactions[J]. Ledger, 2016(1):1-18.
[6] Maxwell G. Coinjoin:Bitcoin privacy for the real world[EB/OL]. 2013[2019-11-07]. https://bitcointalk.org/index.php?topic=279249.
[7] Bissias G, Ozisik A P, Levine B N, et al. Sybil-resistant mixing for Bitcoin[C]//Proceedings of the Workshop on Privacy in the Electronic Society, 2014:149-158.
[8] Miers I, Garman C, Green M, et al. Zerocoin:anonymous distributed E-cash from Bitcoin[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2013:397-411.
[9] Sasson E B, Chiesa A, Garman C, et al. Zerocash:decentralized anonymous payments from Bitcoin[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2014:459-474.
[10] Bensasson E, Chiesa A, Genkin D, et al. SNARKs for C:verifying program executions succinctly and in zero knowledge[J]. Lecture Notes in Computer Science, 2013, 8043:90-108.
[11] Wu Y B, Fan H N, Wang X Y, et al. A regulated digital currency[J]. Science China:Information Sciences, 2019, 62(3):032109. https://doi.org/10.1007/s11432-018-9611-3.
[12] Naganuma K, Yoshino M, Sato H, et al. Auditable Zerocoin[C]//IEEE European Symposium on Security and Privacy Workshops. Piscataway, NJ:IEEE Press, 2017:59-63.
[13] Narula N, Vasquez W, Virza M. ZkLedger:privacy-preserving auditing for distributed ledgers[C]//The 15th USENIX Symposium on Networked Systems Design and Implementation, 2018:65-80.
[14] Wüst K, Kostiainen K, Capkun V, et al. PRCash:fast, private and regulated transactions for digital currencies[C]//Financial Cryptography and Data Security. Berlin:Springer, 2019:158-178.
[15] Jedusor T E. Mimblewimble[R/OL].[2019-11-18]. https://download.wpsoftware.net/bitcoin/wizardry/mimblewimble.txt.
[16] Morais E, Koens T, Wijk C, et al. A survey on zero knowledge range proofs and applications[J]. SN Applied Sciences, 2019, 1(8):1-17.
[17] Frankle J, Park S, Shaar D, et al. Practical accountability of secret processes[C]//The 27th USENIX Security Symposium, 2018:657-674.
[18] Saia J, Zamani M. Recent results in scalable multi-party computation[C]//International Conference on Current Trends in Theory and Practice of Informatics. Berlin:Springer, 2015:24-44.
[19] Chen Y, Ma X. PGC:pretty good confidential transaction system with accountability[EB/OL]. 2019[2019-11-18]. https://eprint.iacr.org/2019/319.
[20] Bunz B, Bootle J, Boneh D, et al. Bulletproofs:short proofs for confidential transactions and more[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2018:315-334.
[21] Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4):469-472.
[22] 杨浩淼, 孙世新, 李洪伟. 双线性Diffie-Hellman问题研究[J]. 四川大学学报(工程科学版), 2006(2):137-140. Yang H M, Sun S X, Li H M. Research on bilinear Diffie-Hellman problem[J]. Journal of Sichuan University (Engineering Science Edition), 2006(2):137-140. (in Chinese)
[23] Saberhagen N. Cryptonote v2.0[EB/OL]. 2018[2019-11-20]. https://download.csdn.net/download/cqliuqiang/10459878.