Abstract
Anti-money laundering (AML), as an important measure to ensure financial security and social stability, has attracted more and more attention. However, due to customer privacy protection, market competition, and other reasons, the current regulatory authorities and financial institutions have not yet formed a customer information sharing mechanism, which makes it difficult to monitor suspicious transactions. In paper, we use the distributed digital identity based on the blockchain to improve over the traditional know your customer (KYC) authentication process by combining KYC and suspicious transaction identification. With the help of cryptographic tools such as zero-knowledge proofs, suspicious interbank transactions can be effectively identified while the legal privacy is preserved.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34–51. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_4
Brown, M., Hankerson, D., López, J., Menezes, A.: Software implementation of the NIST elliptic curves over prime fields. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 250–265. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_19
Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315–334. IEEE (2018)
Cecchetti, E., Zhang, F., Ji, Y., Kosba, A., Juels, A., Shi, E.: Solidus: confidential distributed ledger transactions via PVORM. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 701–717 (2017)
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_7
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12
Gill, M., Taylor, G.: Preventing money laundering or obstructing business? financial companies’ perspectives on ‘know your customer’procedures. Br. J. Criminol. 44(4), 582–594 (2004)
Gstrein, O.J., Kochenov, D.: Digital identity and distributed ledger technology: paving the way to a neo-feudal brave new world? Front. Blockchain 3, 10 (2020)
Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)
Kang, H., Dai, T., Jean-Louis, N., Tao, S., Gu, X.: Fabzk: supporting privacy-preserving, auditable smart contracts in hyperledger fabric. In: 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 543–555. IEEE (2019)
Larina, T.V., Ozyumenko, V.I., Kurteš, S.: I-identity vs we-identity in language and discourse: Anglo-Slavonic perspectives. Lodz Papers Pragmat. 13(1), 109–128 (2017)
Luo, X.: Suspicious transaction detection for anti-money laundering. Int. J. Secur. Its Appl. 8(2), 157–166 (2014)
Mugarura, N.: Customer due diligence (CDD) mandate and the propensity of its application as a global AML paradigm. J. Money Laund. Control 17 (2014)
Nakamoto, S.: Bitcoin: A Peer-to-peer Electronic Cash System (2008)
Narula, N., Vasquez, W., Virza, M.: zkledger: Privacy-preserving auditing for distributed ledgers. In: 15th \(\{\)USENIX\(\}\) Symposium on Networked Systems Design and Implementation (\(\{\)NSDI\(\}\) 2018), pp. 65–80 (2018)
Panait, A.-E., Olimid, R.F., Stefanescu, A.: Analysis of uPort open, an identity management blockchain-based solution. In: Gritzalis, S., Weippl, E.R., Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2020. LNCS, vol. 12395, pp. 3–13. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58986-8_1
Pointcheval, D., Stern, J.: Security Proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_33
Sasson, E.B., et al.: Decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459–474. IEEE (2014)
Sullivan, K.: Anti-Money Laundering in a Nutshell. Apress, Berkeley (2015)
Sun, S.-F., Au, M.H., Liu, J.K., Yuen, T.H.: RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 456–474. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_25
Tsiounis, Y., Yung, M.: On the security of ElGamal based encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054019
Unger, B., Hertog, J.D.: Water always finds its way: identifying new forms of money laundering. Crime Law Soc. Change 57(3), 287–304 (2012)
Wolfond, G.: A blockchain ecosystem for digital identity: improving service delivery in Canada’s public and private sectors. Technol. Innov. Manag. Rev. 7(10), 35–40 (2017)
Yuen, T.H.: Pachain: private, authenticated & auditable consortium blockchain and its implementation. Fut. Gen. Comput. Syst. 112, 913–929 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
He, Y., Chen, J. (2022). AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger. In: Meng, W., Katsikas, S.K. (eds) Emerging Information Security and Applications. EISA 2021. Communications in Computer and Information Science, vol 1403. Springer, Cham. https://doi.org/10.1007/978-3-030-93956-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-93956-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-93955-7
Online ISBN: 978-3-030-93956-4
eBook Packages: Computer ScienceComputer Science (R0)