skip to main content
10.1145/3464298.3493401acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article
Public Access

Privacy preserving event based transaction system in a decentralized environment

Published: 02 December 2021 Publication History

Abstract

In this paper, we present the design and implementation of a privacy preserving event based UTXO (Unspent Transaction Output) transaction system. Unlike the existing approaches that often depend on smart contracts where digital assets are first locked in a vault, and then released according to event triggers, the event based transaction system encodes event outcome as part of the UTXO note and safeguards event privacy by shielding it with zero-knowledge proof based protocols such that associations between UTXO notes and events are hidden from the validators. Without relying on any triggering mechanism, the proposed transaction system separates event processing from the transaction processing where confidential event based UTXO notes (event based UTXOs or conditional UTXOs) can be transferred freely with full privacy in an asynchronous manner, only with their asset values conditional to the linked event outcomes. The main advantage of such design is that it enables free trade of event based digital assets and prevents the assets from being locked. We implemented the proposed transaction system by extending the Zerocoin data model and protocols. The system is implemented and evaluated using xJsnark.

References

[1]
H. Al-Breiki, M. H. U. Rehman, K. Salah, and D. Svetinovic. 2020. Trustworthy Blockchain Oracles: Review, Comparison, and Open Research Challenges. IEEE Access 8 (2020), 85675--85685.
[2]
Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. 2018. Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, Report 2018/046. https://eprint.iacr.org/2018/046.
[3]
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 781--796. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/ben-sasson
[4]
Manuel Blum, Paul Feldman, and Silvio Micali. 1988. Non-interactive zero-knowledge and its applications. In Proceedings of the twentieth annual ACM symposium on Theory of computing. ACM, 103--112.
[5]
Sean Bowe, Ariel Gabizon, and Matthew D. Green. 2017. A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK. Cryptology ePrint Archive, Report 2017/602. https://eprint.iacr.org/2017/602.
[6]
Sean Bowe, Ariel Gabizon, and Ian Miers. 2017. Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model. Cryptology ePrint Archive, Report 2017/1050. https://eprint.iacr.org/2017/1050.
[7]
Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell. 2018. Bulletproofs: Short proofs for confidential transactions and more. In 2018 IEEE Symposium on Security and Privacy. 315--334.
[8]
Vitalik Buterin. 2016. Quadratic Arithmetic Programs: from Zero to Hero.
[9]
Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, and Dan Boneh. 2019. Zether: Towards Privacy in a Smart Contract World. Cryptology ePrint Archive, Report 2019/191. https://eprint.iacr.org/2019/191.
[10]
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, and Luca Nizzardo. 2017. Zero-knowledge contingent payments revisited: Attacks and payments for services. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 229--243.
[11]
Ting Chen, Zihao Li, Yuxiao Zhu, Jiachi Chen, Xiapu Luo, John Chi-Shing Lui, Xiaodong Lin, and Xiaosong Zhang. 2020. Understanding Ethereum via Graph Analysis. ACM Trans. Internet Technol. 20, 2, Article 18 (April 2020), 32 pages.
[12]
Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, and Samee Zahur. 2015. Geppetto: Versatile verifiable computation. In 2015 IEEE Symposium on Security and Privacy. IEEE, 253--270.
[13]
Alfredo De Santis, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, and Amit Sahai. 2001. Robust non-interactive zero knowledge. In Annual International Cryptology Conference. Springer, 566--598.
[14]
Christina Garman, Matthew Green, and Ian Miers. 2016. Accountable privacy for decentralized anonymous payments. In International Conference on Financial Cryptography and Data Security. Springer, 81--98.
[15]
Oded Goldreich and Ariel Kahan. 1996. How to construct constant-round zero-knowledge proof systems for NP. Journal of Cryptology 9, 3 (1996), 167--189.
[16]
Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1985. The knowledge complexity of interactive proof-systems. In Proceedings of the 7th annual ACM Symposium on Theory of Computing - STOC 1985. ACM, 291--304.
[17]
Jens Groth, Rafail Ostrovsky, and Amit Sahai. 2006. Perfect non-interactive zero knowledge for NP. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 339--358.
[18]
Suyash Gupta, Jelle Hellings, Sajjad Rahnama, and Mohammad Sadoghi. 2020. Blockchain Consensus Unraveled: Virtues and Limitations. In Proceedings of the 14th ACM International Conference on Distributed and Event-Based Systems (Montreal, Quebec, Canada) (DEBS '20). Association for Computing Machinery, New York, NY, USA, 218--221.
[19]
Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. 2016. Zcash protocol specification. Tech. rep. 2016--1.10. Zerocoin Electric Coin Company, Tech. Rep. (2016).
[20]
Ari Juels, Lorenz Breidenbach, Alex Coventry, Sergey Nazarov, Steve Ellis, and Brendan Magauran. 2019. Mixicles: Simple Private Decentralized Finance.
[21]
Kamil Kluczniak and Man Ho Au. 2018. Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability. IACR Cryptol. ePrint Arch. 2018 (2018), 176.
[22]
Petar Kochovski, Sandi Gec, Vlado Stankovski, Marko Bajec, and Pavel D Drobintsev. 2019. Trust management in a blockchain based fog computing platform with trustless smart oracles. Future Generation Computer Systems 101 (2019), 747--759.
[23]
A Kosba, A Miller, E Shi, Z Wen, et al. 2015. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts, Tech. In 2016 IEEE Symposium on Security and Privacy (SP). Available at: https://ieeexplore.ieee.org/-document/7546538.
[24]
Ahmed Kosba, Charalampos Papamanthou, and Elaine Shi. 2018. xJsnark: a framework for efficient verifiable computation. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 944--961.
[25]
libsnark 2012--2017. libsnark: a C++ library for zkSNARK proofs. https://github.com/scipr-lab/libsnark.
[26]
José María Manzano, JM Nadales, D Muñoz de la Peña, and Daniel Limón. 2019. Oracle-Based Economic Predictive Control. In 2019 IEEE 58th Conference on Decision and Control (CDC). IEEE, 4246--4251.
[27]
Greg Maxwell. 2016. Confidential transactions. https://people.xiph.org/~greg/.
[28]
Ian Miers, Christina Garman, Matthew Green, and Aviel D Rubin. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In 2013 IEEE Symposium on Security and Privacy. IEEE, 397--411.
[29]
Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, and Nicolas Christin. 2018. An Empirical Analysis of Traceability in the Monero Blockchain. Proceedings on Privacy Enhancing Technologies 2018 (06 2018), 143--163.
[30]
Satoshi Nakamoto. 2019. Bitcoin: A peer-to-peer electronic cash system. Technical Report. Manubot.
[31]
Shen Noether. 2015. Ring SIgnature Confidential Transactions for Monero. IACR Cryptology ePrint Archive 2015 (2015), 1098.
[32]
Shen Noether and Adam Mackenzie. 2016. Ring Confidential Transactions. Ledger 1 (12 2016), 1--18.
[33]
B. Parno, J. Howell, C. Gentry, and M. Raykova. 2013. Pinocchio: Nearly Practical Verifiable Computation. In 2013 IEEE Symposium on Security and Privacy. 238--252.
[34]
Bryan Parno, Jon Howell, Craig Gentry, and Mariana Raykova. 2016. Pinocchio: Nearly Practical Verifiable Computation. Commun. ACM 59, 2 (Jan. 2016), 103--112.
[35]
F. Reid and M. Harrigan. 2011. An Analysis of Anonymity in the Bitcoin System. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing. 1318--1326.
[36]
Dorit Ron and Adi Shamir. [n.d.]. Quantitative Analysis of the Full Bitcoin Transaction Graph.
[37]
Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. 2015. Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom/BigDataSE/ISPA, Vol. 1. IEEE, 57--64.
[38]
Pierangela Samarati and Latanya Sweeney. 1998. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. Technical Report. SRI International.
[39]
Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from bitcoin. In 2014 IEEE Symposium on Security and Privacy. IEEE, 459--474.
[40]
Larry Shi, Bogdan Carbunar, and Radu Sion. 2007. Conditional E-Cash. In Financial Cryptography and Data Security, Sven Dietrich and Rachna Dhamija (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 15--28.
[41]
Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptol. ePrint Arch. 2016 (2016), 1159.
[42]
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town Crier: An Authenticated Data Feed for Smart Contracts. Cryptology ePrint Archive, Report 2016/168. https://eprint.iacr.org/2016/168.
[43]
Fan Zhang, Sai Krishna Deepak Maram, Harjasleen Malvai, Steven Goldfeder, and Ari Juels. 2019. DECO: Liberating Web Data Using Decentralized Oracles for TLS. arXiv preprint arXiv:1909.00938 (2019).

Cited By

View all
  • (2024)Trusted LLM Inference on the Edge with Smart Contracts2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)10.1109/ICBC59979.2024.10634448(1-7)Online publication date: 27-May-2024
  • (2023)Who is Smarter? An Empirical Study of AI-Based Smart Contract Creation2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)10.1109/BRAINS59668.2023.10316829(1-8)Online publication date: 11-Oct-2023

Index Terms

  1. Privacy preserving event based transaction system in a decentralized environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    Middleware '21: Proceedings of the 22nd International Middleware Conference
    December 2021
    398 pages
    ISBN:9781450385343
    DOI:10.1145/3464298
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    • USENIX Assoc: USENIX Assoc
    • IFIP

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 December 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. UTXO
    2. distributed ledger
    3. privacy
    4. zero-knowledge proof

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    Middleware '21
    Sponsor:
    Middleware '21: 22nd International Middleware Conference
    December 6 - 10, 2021
    Québec city, Canada

    Acceptance Rates

    Overall Acceptance Rate 203 of 948 submissions, 21%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)183
    • Downloads (Last 6 weeks)34
    Reflects downloads up to 19 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Trusted LLM Inference on the Edge with Smart Contracts2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)10.1109/ICBC59979.2024.10634448(1-7)Online publication date: 27-May-2024
    • (2023)Who is Smarter? An Empirical Study of AI-Based Smart Contract Creation2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)10.1109/BRAINS59668.2023.10316829(1-8)Online publication date: 11-Oct-2023

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media