Abstract
Distributed ledger schemes supporting users privacy protection have been proposed recently to provide users with better anonymity. However, their schemes made compromises in users addition or deletion, calculation efficiency, and storage overhead. How to implement a work that supports users dynamic addition and deletion with low computational and storage overhead in multi-user scenarios remains a challenging problem. This work introduces our scheme, a more efficient and dynamic user-supported auditing private ledger system. Computational overhead in our scheme is far less than the previous schemes. The storage overhead is independent of the number of transactions, thus only a minimal storage space can store large ledger. Specifically, we firstly propose a new authentication data structure, Sparse Prefix Symbol Tree (SPST), which can be used as an accumulator to implement ledger pruning. Secondly, we introduce a new encryption primitive Order-Revealing Encryption (ORE) to complete cipher text comparison, which reduces the computational overhead and storage space caused by zero-knowledge proof in the original schemes. Thirdly, our scheme use ledger pruning technology and a weighted random sampling algorithm to reduce storage overhead. We provide a formal security concept and conduct a security analysis of our program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahn, G.J., Shehab, M., Squicciarini, A.: Security and privacy in social networks. IEEE Internet Comput. 15(3), 10–12 (2011)
Arasu, A., et al.: FastVer: making data integrity a commodity. In: Proceedings of the 2021 International Conference on Management of Data, pp. 89–101 (2021)
Bünz, B., Agrawal, S., Zamani, M., Boneh, D.: Zether: towards privacy in a smart contract world. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 423–443. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_23
Cecchetti, E., Zhang, F., Ji, Y., Kosba, A., Juels, A., Shi, E.: Solidus: confidential distributed ledger transactions via PVORM. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 701–717 (2017)
Centelles, A., Dijkstra, G.: Extending zkLedger with private swaps. In: 15th USENIX Symposium on Networked Systems Design and Implementation (2018)
Chase, M., Deshpande, A., Ghosh, E., Malvai, H.: SEEMless: sSecure end-to-end encrypted messaging with less trust. In: Proceedings of the 2019 ACM SIGSAC conference on Computer and Communications Security, pp. 1639–1656 (2019)
Chatzigiannis, P., Baldimtsi, F.: MiniLedger: compact-sized anonymous and auditable distributed payments. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12972, pp. 407–429. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-88418-5_20
Chen, Yu., Ma, X., Tang, C., Au, M.H.: PGC: decentralized confidential payment system with auditability. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 591–610. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58951-6_29
Chenette, N., Lewi, K., Weis, S.A., Wu, D.J.: Practical Order-Revealing Encryption with Limited Leakage. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 474–493. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-52993-5_24
Efraimidis, P.S., Spirakis, P.G.: Weighted random sampling with a reservoir. Inf. Process. Lett. 97(5), 181–185 (2006)
Fauzi, P., Meiklejohn, S., Mercer, R., Orlandi, C.: Quisquis: a new design for anonymous cryptocurrencies. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 649–678. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34578-5_23
Garman, C., Green, M., Miers, I.: Accountable privacy for decentralized anonymous payments. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 81–98. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_5
Jiang, Y., Li, Y., Zhu, Y.: Auditable zerocoin scheme with user awareness. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 28–32 (2019)
Kang, H., Dai, T., Jean-Louis, N., Tao, S., Gu, X.: FabZK: supporting privacy-preserving, auditable smart contracts in hyperledger fabric. In: 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 543–555. IEEE (2019)
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M.H., Liu, D.: Traceable monero: anonymous cryptocurrency with enhanced accountability. IEEE Trans. Depend. Secure Comput. 18, 679–691 (2019)
Maxwell, G., Poelstra, A.: Borromean ring signatures. https://raw.githubusercontent.com/Blockstream/borromean_paper/master/borromean_draft_0.01_34241bb.pdf
Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140 (2013)
Morrison, D.R.: Patricia-practical algorithm to retrieve information coded in alphanumeric. J. ACM 15(4), 514–534 (1968)
Narula, N., Vasquez, W., Virza, M.: zkLedger: privacy-preserving auditing for distributed ledgers. In: 15th USENIX Symposium on Networked Systems Design and Implementation NSDI 2018), pp. 65–80 (2018)
Ober, M., Katzenbeisser, S., Hamacher, K.: Structure and anonymity of the bitcoin transaction graph. Future internet 5(2), 237–250 (2013)
Oprea, A., Bowers, K.D.: Authentic time-stamps for archival storage. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 136–151. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04444-1_9
Poelstra, A., Back, A., Friedenbach, M., Maxwell, G., Wuille, P.: Confidential assets, 2017. In: 4th Workshop on Bitcoin and Blockchain Research (2017)
Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_2
Saad, M., et al.: Exploring the attack surface of blockchain: a systematic overview. arXiv preprint arXiv:1904.03487 (2019)
Sasson, E.B., et al.: Zerocash: Decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459–474. IEEE (2014)
Van Saberhagen, N.: Cryptonote v 2.0 (2013). https://cryptonote.org/whitepaper.pdf
Wüst, K., Kostiainen, K., Čapkun, V., Čapkun, S.: PRCash: fast, private and regulated transactions for digital currencies. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 158–178. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-32101-7_11
Acknowledgment
This work is supported by the Fundamental Research Funds for the Central Universities (No. JB211503).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, Y., Yuan, Z., Hu, Y. (2022). FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers. In: Chen, X., Shen, J., Susilo, W. (eds) Cyberspace Safety and Security. CSS 2022. Lecture Notes in Computer Science, vol 13547. Springer, Cham. https://doi.org/10.1007/978-3-031-18067-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-18067-5_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18066-8
Online ISBN: 978-3-031-18067-5
eBook Packages: Computer ScienceComputer Science (R0)