skip to main content
10.1145/3491396.3506528acmconferencesArticle/Chapter ViewAbstractPublication PagesiceaConference Proceedingsconference-collections
research-article

Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature

Published: 07 January 2022 Publication History

Abstract

As research on blockchain deepens, privacy protection technologies of blockchain continue to develop. However, the use of these privacy protection technologies may cause supervisory problems since tracing and censoring malicious users and their misbehaviors become difficult. In order to solve the supervisory problems, we propose a supervisory scheme based on the Linkable Spontaneous Anonymous Group Signature (LSAG) schemes. In this paper, we first proposed the overall supervisory scheme based on LSAG to achieve effective tracing of blockchain users. To prevent tracing power abuses, we then redesigned the key generation algorithm and its corresponding negotiative decryption algorithm in the scheme to allow decentralized traceability. Only when all supervisory nodes agree can a transaction be decrypted and linked to its sender. Experiments show that our scheme can effectively realize transaction accountability and also prevent the abuse of this supervisory power.

References

[1]
Taylor P J, Dargahi T, Dehghantanha A, et al. A systematic literature review of blockchain cyber security[J]. Digital Communications and Networks, 2020, 6(2): 147--156.
[2]
Shao W, Li H, Chen M, et al. Identifying bitcoin users using deep neural network[C]. International Conference on Algorithms and Architectures for Parallel Processing. Springer, Cham, 2018: 178--192.
[3]
Sun Yin H, Langenheldt K, Harlev M, et al. Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain[J]. Journal of Management Information Systems, 2019, 36(1): 37--73.
[4]
Luo Y, Wang Z, Fan J, et al. A New One-time Address Scheme for Blockchain[C]. 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2019: 1--5.
[5]
Zhang J, Zhong S, Wang T, et al. Blockchain-based systems and applications: a survey[J]. Journal of Internet Technology, 2020, 21(1): 1--14.
[6]
Hao M, Li H, Luo X, et al. Efficient and privacy-enhanced federated learning for industrial artificial intelligence[J]. IEEE Transactions on Industrial Informatics, 2019, 16(10): 6532--6542.
[7]
Meiklejohn S, Pomarole M, Jordan G, et al. A fistful of bitcoins: characterizing payments among men with no names[C]. Proceedings of the 2013 conference on Internet measurement conference, 2013: 127--140.
[8]
Androulaki E, Karame G. O, Roeschlin M, et al. Evaluating user privacy in bitcoin[C]. International conference on financial cryptography and data security. Springer, Berlin, Heidelberg, 2013: 34--51.
[9]
Monaco J V. Identifying bitcoin users by transaction behavior[C]. Biometric and Surveillance Technology for Human and Activity Identification XII. International Society for Optics and Photonics, 2015, 9457: 945704.
[10]
Wang Z, Fan J, Cheng L, et al. Supervised anonymous authentication scheme[J]. Journal of Software, 2019, 30(6): 1705--1720.
[11]
Zhu Y, Hu H, Ahn G J, et al. Cooperative provable data possession for integrity verification in multicloud storage[J]. IEEE transactions on parallel and distributed systems, 2012, 23(12): 2231--2244.
[12]
Wu Y, Fan H, Wang X, et al. A regulated digital currency[J]. Science China Information Sciences, 2019, 62(3): 32109.
[13]
Peili L, Haixia X. Blockchain User Anonymity and Traceability Technology[J]. Journal of Electrionic & Information Technology, 2020, 42(5): 1061--1067.
[14]
Cheng L, Liu J, Jin Y, et al. Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain[J]. ACM Transactions on Internet Technology (TOIT), 2021, 21(1): 1--19.
[15]
Li Y, Susilo W, Yang G, et al. Toward privacy and regulation in blockchain-based cryptocurrencies[J]. IEEE Network, 2019, 33(5): 111--117.
[16]
Li Y, Yang G, Susilo W, et al. Traceable monero: Anonymous cryptocurrency with enhanced accountability[J]. IEEE Transactions on Dependable and Secure Computing, 2019.
[17]
Li P, Xu H, Ma T. An efficient identity tracing scheme for blockchain-based systems[J]. Information Sciences, 2021, 561: 130--140.
[18]
Hofheinz D, Ursu B. Dual-mode NIZKs from obfuscation[C]. International Conference on the Theory and Application of Cryptology and Information Security. Springer, Cham, 2019: 311--341.
[19]
Derler D, Slamanig D. Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs[J]. Designs, Codes and Cryptography, 2018, 86(11): 2525--2547.
[20]
Li M, Lal C, Conti M, et al. LEChain: A blockchain-based lawful evidence management scheme for digital forensics[J]. Future Generation Computer Systems, 2021, 115: 406--420.
[21]
Martinko M J, Harvey P, Brees J R, et al. A review of abusive supervision research[J]. Journal of organizational behavior, 2013, 34(S1): S120-S137.
[22]
Chen P W, Jiang B S, Wang C H. Blockchain-based payment collection supervision system using pervasive Bitcoin digital wallet[C]. 2017 IEEE 13th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, 2017: 139--146.

Cited By

View all
  • (2024)Advancements in Protection Coordination of Microgrids: a Comprehensive Review of Protection Challenges and Mitigation Schemes for Grid StabilityProtection and Control of Modern Power Systems10.23919/PCMP.2023.0002509:6(156-183)Online publication date: Nov-2024

Index Terms

  1. Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications
        December 2021
        241 pages
        ISBN:9781450391603
        DOI:10.1145/3491396
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 07 January 2022

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Blockchain
        2. Group signature
        3. Power abuse
        4. Supervisory

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        • Shandong Provincial Key Research and Development Program
        • National Natural Science Foundation of China-Liaoning Joint Fund
        • Shandong Provincial Key Research and Development Program
        • the Key Research and Development Program of Shandong Academy of Science award
        • the Shandong Provincial Natural Science Foundation of China
        • the Science, Education and Industry Integration Innovation Program of Qilu University of Technology (Shandong Academy of Science)

        Conference

        ACM ICEA '21
        Sponsor:

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)29
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Advancements in Protection Coordination of Microgrids: a Comprehensive Review of Protection Challenges and Mitigation Schemes for Grid StabilityProtection and Control of Modern Power Systems10.23919/PCMP.2023.0002509:6(156-183)Online publication date: Nov-2024

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media