This paper designs a mixing scheme with one decentralized signature protocol, which does not rely on a third party or require a transaction fee, and includes a signature protocol based on the ElGamal signature protocol and secret sharing.
Abstract:
Bitcoin transactions are not truly anonymous as an attacker can attempt to reveal a user’s private information by tracing related transactions. Existing approaches to protect privacy (e.g., mixcoin, shuffle, and blinded token) suffer from a number of limitations. For example, some approaches assume the existence of a trusted third party, rely on exchanges among various currencies, or broadcast sensitive details before mixing. Therefore, there is a real risk of privacy breach or losing tokens. Thus in this paper, we design a mixing scheme with one decentralized signature protocol, which does not rely on a third party or require a transaction fee. Specifically, our scheme uses a negotiation process to guarantee transaction details, which is monitored by the participants. Furthermore, the scheme includes a signature protocol based on the ElGamal signature protocol and secret sharing. The proposed scheme is then proven secure.
1545-5971 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2019.2938953, IEEE
Authorized licensed use limited to: University of Technology Sydney. Downloaded on October 17,2020 at 07:07:44 UTC from IEEE Xplore. Restrictions apply.
1545-5971 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2019.2938953, IEEE
Authorized licensed use limited to: University of Technology Sydney. Downloaded on October 17,2020 at 07:07:44 UTC from IEEE Xplore. Restrictions apply.
1545-5971 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2019.2938953, IEEE
Authorized licensed use limited to: University of Technology Sydney. Downloaded on October 17,2020 at 07:07:44 UTC from IEEE Xplore. Restrictions apply.
1545-5971 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2019.2938953, IEEE
Authorized licensed use limited to: University of Technology Sydney. Downloaded on October 17,2020 at 07:07:44 UTC from IEEE Xplore. Restrictions apply.
1545-5971 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2019.2938953, IEEE
Authorized licensed use limited to: University of Technology Sydney. Downloaded on October 17,2020 at 07:07:44 UTC from IEEE Xplore. Restrictions apply.
TL;DR: In this article , a survey of the role and gains of blockchain, intelligent networking, and the combination of both in providing the immersive experiences of the metaverse is presented, including overviews, applications, and challenges.
TL;DR: A Trustzone-based Secure Lightweight Wallet for Hyperledger Fabric (hereafter referred to as TSLWHF) is proposed, which designed an Unspent Transaction Output (UTXO) set of transactions under blockchain and a signature verification mechanism for transactions, which made it possible to implement the lightweight wallet in hyperledger fabric.
TL;DR: Wang et al. as discussed by the authors conduct a comprehensive study on channel building and survey its core technologies by information embedding, transaction filtering, and transaction obfuscation, and summarize evaluation metrics to better analyze blockchain-based covert channels.
TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
TL;DR: It is shown that the two networks derived from Bitcoin's public transaction history have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity.
TL;DR: In this article, the authors consider the topological structure of two networks derived from Bitcoin's public transaction history and combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins.
TL;DR: This research examines the use of pseudonymity in the Bitcoin network, and the role that it plays in the development of trust and confidence in the system.
TL;DR: CoinShuffle is a completely decentralized Bitcoin mixing protocol that allows users to utilize Bitcoin in a truly anonymous manner and it does not require any trusted, accountable or untrusted third party and it is perfectly compatible with the current Bitcoin system.
Q1. What are the contributions in "A mixing scheme using a decentralized signature protocol for privacy protection in bitcoin blockchain" ?
Thus in this paper, the authors design a mixing scheme with one decentralized signature protocol, which does not rely on a third party or require a transaction fee. Furthermore, the scheme includes a signature protocol based on the ElGamal signature protocol and secret sharing.
Q2. What are the future works mentioned in the paper "A mixing scheme using a decentralized signature protocol for privacy protection in bitcoin blockchain" ?
To improve their proposed signature protocol, the authors can extend a verification process during each P2P interaction. In this way, no one else except user itself will have access to this user ’ s initial transaction details. Apart from that, not only assessments but also verifications can be easily completed through smart contracts.
Q3. What is the purpose of secret sharing?
Secret sharing is used to prevent users from distributing signatures to malicious nodes by placing all the group members into an agreement using a secret.
Q4. Where did she receive her BEng and MEng degrees?
Zhu received her BEng and MEng degrees from Wuhan University, China, in 2000 and 2004, respectively, and a Ph.D degree from Deakin University in Computer Science, Australia, in 2014.
Q5. What are the main disadvantages of existing schemes?
The authors outlined three main disadvantages of existing schemes in Section The authorand Section III-A: delay, extra charges, and privacy breaches.
Q6. What is the way to design a shared secret?
The ElGamal signature protocol is suitable for designing a shared secret, as ElGamal′is signature includes a commitment, which makes it possible to prove every user′is ownership of a private key.
Q7. What is the way to prevent a third party from a mixing process?
for a better performance without a mixing third party, nodes in a mixing group can conduct broadcast processes in a lightweight blockchain among themselves.
Q8. Why is the signature protocol considered to be secure?
the ElGamal signature protocol [23] has been proven to be secure because discrete logarithmic problems are believed to be hard.