• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Ziyu, Liu Jianwei, Zhang Zongyang, Yu Hui. Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction[J]. Journal of Computer Research and Development, 2018, 55(10): 2185-2198. DOI: 10.7544/issn1000-1239.2018.20180430
Citation: Wang Ziyu, Liu Jianwei, Zhang Zongyang, Yu Hui. Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction[J]. Journal of Computer Research and Development, 2018, 55(10): 2185-2198. DOI: 10.7544/issn1000-1239.2018.20180430

Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction

More Information
  • Published Date: September 30, 2018
  • The public ledger of Bitcoin blockchain system offers ownership proof for distributed users by revealing all transaction details from coinbase transaction to unspent transaction output. However, an adversary could deanonymize user identities by transaction graph analysis and obtain transaction amount which reveals users’ privacy. This paper resolves this problem and uses both mixing and confidential transaction technique to achieve a full anonymous blockchain system by a one-way aggregate signature scheme and a homomorphic encryption scheme. It protects user identities and transaction amount to achieve full anonymity. The one-way aggregate signature scheme compresses all individual signatures to an aggregated one without additional storage space, which could neutralize the storage overhead caused by confidential transaction to a certain extent. The homomorphic encryption scheme encrypts the plaintext transaction amount to the Pedersen-style ciphertext, which is validated without decryption. In addition, miners in our system would become entities for verifying, mixing and packing all transactions in blocks. Four-step validation mechanism is also designed to prevent transaction makers from cheating. Finally, we evaluate our system with related work from the aspect of privacy protection, in which our storage overhead is acceptable with full anonymity.
  • Related Articles

    [1]Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng. Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios[J]. Journal of Computer Research and Development, 2024, 61(10): 2467-2481. DOI: 10.7544/issn1000-1239.202440489
    [2]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [3]Xu Guangwei, Bai Yanke, Yan Cairong, Yang Yanbin, Huang Yongfeng. Check Algorithm of Data Integrity Verification Results in Big Data Storage[J]. Journal of Computer Research and Development, 2017, 54(11): 2487-2496. DOI: 10.7544/issn1000-1239.2017.20160825
    [4]Fu Shuai, Jiang Qi, Ma Jianfeng. A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2016, 53(9): 2030-2038. DOI: 10.7544/issn1000-1239.2016.20150456
    [5]Tan Shuang, He Li, Chen Zhikun, Jia Yan. A Method of Provable Data Integrity Based on Lattice in Cloud Storage[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872. DOI: 10.7544/issn1000-1239.2015.20140610
    [6]Dou Yi, Huang Haiping, Wang Ruchuan, Qin Xiaolin. Secure Range Query in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1253-1266.
    [7]Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.
    [8]Hu Xinping, He Yuzhi, Ni Weiwei, and Zhang Yong. A Privacy-Preserving Data Publishing Method Based on Genetic Algorithm with Roulette Wheel[J]. Journal of Computer Research and Development, 2012, 49(11): 2432-2439.
    [9]Li Bo, Li Jianxin, Hu Chunming, Wo Tianyu, and Huai Jinpeng. Software Integrity Verification Based on VMM-Level System Call Analysis Technique[J]. Journal of Computer Research and Development, 2011, 48(8): 1438-1446.
    [10]Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui. A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy[J]. Journal of Computer Research and Development, 2009, 46(3): 498-504.

Catalog

    Article views (2284) PDF downloads (1115) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return