Skip to main content

AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger

  • Conference paper
  • First Online:
  • 534 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1403))

Abstract

Anti-money laundering (AML), as an important measure to ensure financial security and social stability, has attracted more and more attention. However, due to customer privacy protection, market competition, and other reasons, the current regulatory authorities and financial institutions have not yet formed a customer information sharing mechanism, which makes it difficult to monitor suspicious transactions. In paper, we use the distributed digital identity based on the blockchain to improve over the traditional know your customer (KYC) authentication process by combining KYC and suspicious transaction identification. With the help of cryptographic tools such as zero-knowledge proofs, suspicious interbank transactions can be effectively identified while the legal privacy is preserved.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34–51. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_4

    Chapter  Google Scholar 

  2. Brown, M., Hankerson, D., López, J., Menezes, A.: Software implementation of the NIST elliptic curves over prime fields. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 250–265. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_19

    Chapter  Google Scholar 

  3. Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018)

    Google Scholar 

  4. Cecchetti, E., Zhang, F., Ji, Y., Kosba, A., Juels, A., Shi, E.: Solidus: confidential distributed ledger transactions via PVORM. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 701–717 (2017)

    Google Scholar 

  5. Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_7

    Chapter  Google Scholar 

  6. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12

    Chapter  Google Scholar 

  7. Gill, M., Taylor, G.: Preventing money laundering or obstructing business? financial companies’ perspectives on ‘know your customer’procedures. Br. J. Criminol. 44(4), 582–594 (2004)

    Article  Google Scholar 

  8. Gstrein, O.J., Kochenov, D.: Digital identity and distributed ledger technology: paving the way to a neo-feudal brave new world? Front. Blockchain 3, 10 (2020)

    Article  Google Scholar 

  9. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)

    Article  Google Scholar 

  10. Kang, H., Dai, T., Jean-Louis, N., Tao, S., Gu, X.: Fabzk: supporting privacy-preserving, auditable smart contracts in hyperledger fabric. In: 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 543–555. IEEE (2019)

    Google Scholar 

  11. Larina, T.V., Ozyumenko, V.I., Kurteš, S.: I-identity vs we-identity in language and discourse: Anglo-Slavonic perspectives. Lodz Papers Pragmat. 13(1), 109–128 (2017)

    Article  Google Scholar 

  12. Luo, X.: Suspicious transaction detection for anti-money laundering. Int. J. Secur. Its Appl. 8(2), 157–166 (2014)

    Google Scholar 

  13. Mugarura, N.: Customer due diligence (CDD) mandate and the propensity of its application as a global AML paradigm. J. Money Laund. Control 17 (2014)

    Google Scholar 

  14. Nakamoto, S.: Bitcoin: A Peer-to-peer Electronic Cash System (2008)

    Google Scholar 

  15. Narula, N., Vasquez, W., Virza, M.: zkledger: Privacy-preserving auditing for distributed ledgers. In: 15th \(\{\)USENIX\(\}\) Symposium on Networked Systems Design and Implementation (\(\{\)NSDI\(\}\) 2018), pp. 65–80 (2018)

    Google Scholar 

  16. Panait, A.-E., Olimid, R.F., Stefanescu, A.: Analysis of uPort open, an identity management blockchain-based solution. In: Gritzalis, S., Weippl, E.R., Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2020. LNCS, vol. 12395, pp. 3–13. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58986-8_1

    Chapter  Google Scholar 

  17. Pointcheval, D., Stern, J.: Security Proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_33

    Chapter  Google Scholar 

  18. Sasson, E.B., et al.: Decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459–474. IEEE (2014)

    Google Scholar 

  19. Sullivan, K.: Anti-Money Laundering in a Nutshell. Apress, Berkeley (2015)

    Google Scholar 

  20. Sun, S.-F., Au, M.H., Liu, J.K., Yuen, T.H.: RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 456–474. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_25

    Chapter  Google Scholar 

  21. Tsiounis, Y., Yung, M.: On the security of ElGamal based encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054019

    Chapter  Google Scholar 

  22. Unger, B., Hertog, J.D.: Water always finds its way: identifying new forms of money laundering. Crime Law Soc. Change 57(3), 287–304 (2012)

    Article  Google Scholar 

  23. Wolfond, G.: A blockchain ecosystem for digital identity: improving service delivery in Canada’s public and private sectors. Technol. Innov. Manag. Rev. 7(10), 35–40 (2017)

    Google Scholar 

  24. Yuen, T.H.: Pachain: private, authenticated & auditable consortium blockchain and its implementation. Fut. Gen. Comput. Syst. 112, 913–929 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiageng Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, Y., Chen, J. (2022). AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger. In: Meng, W., Katsikas, S.K. (eds) Emerging Information Security and Applications. EISA 2021. Communications in Computer and Information Science, vol 1403. Springer, Cham. https://doi.org/10.1007/978-3-030-93956-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-93956-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-93955-7

  • Online ISBN: 978-3-030-93956-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics