Abstract
Blockchain-based payment systems (e.g., Bitcoin) have been wildly adopted for many scenarios since the transaction details are publicly accessible. Blockchain-based anonymous payment systems (e.g., Monero and Zerocash) have also been proposed to protect on-chain privacy, such as the sender’s or receiver’s balance, and the transaction amount. However, overly privacy preserving systems are sometimes abused for malicious behavior in lieu of suitable regulation. Thus, balancing between requirements for regulation and privacy has become an important issue for such systems. This paper proposes a blockchain-based confidential payment system with controllable regulation. To protect user privacy and provide controllable regulations, we realized the proposed system using threshold homomorphic encryption to encrypt user transaction values and balance. The encryption was performed with thresholded regulators’ keys and hence limits regulator abilities to decrypt a transaction. In addition, we can update the user’s balance using the homomorphic property, without decrypting the transaction value or user’s balance, preserving on-chain privacy, while satisfying all security requirements. A prototype implementation is provided for performance analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., Faonio, A., Magri, B., de Medeiros, B.: Certified Bitcoins. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 80–96. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07536-5_6
Ben Sasson, E., et al.: Zerocash: decentralized anonymous payments from Bitcoin. In: IEEE S &P 2014, pp. 459–474. IEEE (2014)
Buterin, V.: Ethereum: a next-generation smart contract and decentralized application platform (2014). https://nft2x.com/wp-content/uploads/2021/03/EthereumWP.pdf
Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: IEEE S &P 2018, pp. 315–334. IEEE (2018)
Cecchetti, E., Zhang, F., Ji, Y., Kosba, A., Juels, A., Shi, E.: Solidus: confidential distributed ledger transactions via PVORM. In: CCS 2017, pp. 701–717. ACM (2017)
Chaidos, P., Groth, J.: Making Sigma-protocols non-interactive without random oracles. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 650–670. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46447-2_29
Chen, Y., Ma, X., Tang, C., Au, M.H.: PGC: decentralized confidential payment system with auditability. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 591–610. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58951-6_29
Conti, M., Sandeep Kumar, E., Lal, C., Ruj, S.: A survey on security and privacy issues of Bitcoin. In: IEEE Communications Surveys and Tutorials, vol. 20, pp. 3416–3452. IEEE (2018)
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_28
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12
Fouque, P.A., Joux, A., Tibouchi, M.: Injective encodings to elliptic curves. In: Boyd, C., Simpson, L. (eds.) ACISP 2013. LNCS, vol. 7959, pp. 203–218. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39059-3_14
Garman, C., Green, M., Miers, I.: Accountable privacy for decentralized anonymous payments. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 81–98. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_5
I. Miers, C.G., M. Green, A.D.R.: Zerocoin: anonymous distributed E-cash from Bitcoin. In: IEEE S &P 2013, pp. 397–411. IEEE (2013)
Krawczyk, H.: SIGMA: the SIGn-and-MAc’ approach to authenticated diffie-hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_24
Lin, C., He, D., Huang, X., Khan, M.K., Choo, K.K.R.: DCAP: a secure and efficient decentralized conditional anonymous payment system based on blockchain. IEEE Trans. Inf. Forensics Secur. 15, 2440–2452 (2020)
McCarthy, K.J., van Santen, P., Fiedler, I.: Modeling the money launderer: microtheoretical arguments on anti-money laundering policy. In: International Review of Law and Economics, vol. 43, pp. 148–155. Elsevier (2015)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-46416-6_47
Petkus, M.: Why and how zk-SNARK works (2019). http://arxiv.org/abs/1906.07221
Pietschmann, T., Walker, J.: Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes (2011). https://www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf
Saberhagen, N.V.: Cryptonote v 2.0 (2013). https://bytecoin.org/old/whitepaper.pdf
Shen, X.S., et al.: Data management for future wireless networks: architecture, privacy preservation, and regulation. In: IEEE Networking, vol. 35, pp. 8–15. IEEE (2021)
Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: RingCT 2.0: a compact accumulator-based (Linkable Ring Signature) protocol for blockchain cryptocurrency monero. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 456–474. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_25
van Wegberg, R., Oerlemans, J.J., van Deventer, O.: Bitcoin money laundering: Mixed results? an explorative study on money laundering of cybercrime proceeds using Bitcoin. In: Journal Financial Crime, pp. 419–435. Emerald Publishing Limited (2018)
Williamson, Z.J.: The AZTEC protocol (2018). https://raw.githubusercontent.com/AztecProtocol/AZTEC/master/AZTEC.pdf
Xue, L., Liu, D., Ni, J., Lin, X., Shen, X.S.: Enabling regulatory compliance and enforcement in decentralized anonymous payment. In: IEEE Transactions on Dependable and Secure Computing. IEEE (2022)
Acknowledgments
The authors thank the anonymous reviewers of ISPEC 2022 for their insightful suggestions on this work. This research is partially supported by the National Science and Technology Council, Taiwan (ROC), under grant numbers NSTC 109-2221-E-004-011-MY3, NSTC 110-2221-E-004-003-, NSTC 110-2622-8-004-001-, and NSTC 111-2218-E-004-001-MBK.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Liao, YC., Tso, R., Liu, ZY., Tseng, YF. (2022). Blockchain-Based Confidential Payment System with Controllable Regulation. In: Su, C., Gritzalis, D., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2022. Lecture Notes in Computer Science, vol 13620. Springer, Cham. https://doi.org/10.1007/978-3-031-21280-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-21280-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21279-6
Online ISBN: 978-3-031-21280-2
eBook Packages: Computer ScienceComputer Science (R0)