Journal of Guangdong University of Technology ›› 2021, Vol. 38 ›› Issue (01): 64-68.doi: 10.12052/gdutxb.200041

• Comprehensive Studies • Previous Articles     Next Articles

A Digital Currency Decentralized Obfuscation Scheme with Customizable Amounts

Nie Min-hang, Ou Yu-yi   

  1. School of Computers, Guangdong University of Technology, Guangzhou 510006, China
  • Received:2020-03-11 Online:2021-01-25 Published:2020-12-01

Abstract: Blockchain is a new decentralized architecture with the rise of bitcoin and other digital currencies. In blockchain, pseudonyms are used to provide anonymity. However, studies have shown that such anonymity is not safe. Correlation between different pseudonyms can be found through transaction graph analysis, and the pseudonyms of the same user can be found to destroy anonymity. This problem can be solved by mixing addresses. A decentralized hybrid method is proposed, which is proved by analysis to be able to effectively protect users' privacy and realize the mixing of different amounts of users to increase the convenience.

Key words: block chain, digital currency, privacy protection, unlinkability, anonymity

CLC Number: 

  • TN918.4
[1] 杨承霖.财经观察: “央行数字货币”破茧还有多久[EB/OL]. (2019-12-18) [2020-01-13]. http://www.xinhuanet.com/2019-12/18/c_1125360605.htm.
[2] 王皓, 宋祥福, 柯俊明, 等. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017(7): 32-39.
WANG H, SONG X F, KE J M, et al. Blockchain and privacy preserving mechanisms in cryptocurrency [J]. Netinfo Security, 2017(7): 32-39.
[3] 付烁, 徐海霞, 李佩丽, 等. 数字货币的匿名性研究[J]. 计算机学报, 2019, 42(5): 1045-1062.
FU S, XU H X, LI P L, et al. A survey on anonymity of digital currency [J]. Chinese Journal of Computers, 2019, 42(5): 1045-1062.
[4] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481-494.
YUAN Y, WANG F Y. Blockchain: the state of the art and future trends [J]. Acta Automatica Sinica, 2016, 42(4): 481-494.
[5] 王宗慧, 张胜利, 金石, 等. 区块链数据隐私保护研究[J]. 物联网学报, 2018, 2(3): 71-81.
WANG Z H, ZHANG S L, JIN S, et al. Survey on privacy preserving techniques for blockchain [J]. Chinese Journal on Internet of Things, 2018, 2(3): 71-81.
[6] 祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10): 2170-2186.
ZHU L H, GAO F, SHEN M, et al. Server on privacy preserving techniques for blockchain technology [J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.
[7] ZHANG R, XUE R, LIU L. Security and privacy on blockchain [J]. ACM Computing Surveys, 2019, 52(3): 1-34.
[8] ANDROULAKI E, KARAME G O, ROESCHLIN M, et al. Evaluating user privacy in bitcoin [C]//Financial Cryptography and Data Security. Berlin: Springer, 2013: 34-51.
[9] REID F, HARRIGAN M. An analysis of anonymity in the bitcoin system [C]//Proc of the 3rd IEEE Int Conf on Privacy, Security, Risk and Trust. Piscataway, NJ: IEEE, 2011: 1318-1326.
[10] RON D, SHAMIR A. Quantitative analysis of the full bitcoin transaction graph [C]//Financial Cryptography. Berlin: Springer, 2013: 6-24.
[11] MELKLEJOHN S, POMAROLE M, JORDAN G, et al. A fistful of bitcoins: Characterizing payments among men with no names [C]//Proc of the 13th ACM Internet Measurement Conf. New York: ACM, 2013: 127-140.
[12] KOSHY P, KOSHY D, MCDANIEL P. An analysis of anonymity in bitcoin using P2P network traffic [C]//Financial Cryptography and Data Security. Berlin: Springer. 2014: 469-485.
[13] BIRYUKOV A, PUSTOGAROV I. Bitcoin over tor isn’t a good idea [C]//2015 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE, 2015: 122-134.
[14] MIERS I, GARMAN C, GREEN M, et al. Zerocoin: Anonymous distributed e-cash from bitcoin [C]//2013 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE, 2013: 397-411.
[15] FEIGE U, FIAT A, SHAMIR A. Zero-knowledge proofs of identity [J]. Journal of Cryptology, 1988, 1(2): 77-94.
[16] BONNEAU J, NARAYANAN A, MILLER A, et al. Mixcoin: anonymity for bitcoin with accountable mixes [C]//Financial Cryptography and Data Security. Berlin: Springer, 2014: 486-504.
[17] VALENTA L, ROWAN B. Blindcoin: blinded, accountable mixes for bitcoin.[C]//Financial Cryptography and Data Security. Berlin: Springer, 2015: 112-126.
[18] GREGORY M. CoinJoin: Bitcoin privacy for the real world [EB/OL]. (2013-08-22) [2020-01-13]. http://bitcointalk.org/index.php?topic=279249.0.
[19] TIM R, PEDRO M S, ANIKET K. CoinShuffle: practical decentralized coin mixing for bitcoin [C]//European Symposium on Research in Computer Security (ESORICS). Berlin: Springer, 2014: 345-364.
[20] WANG Q, LI X X, YU Y. Anonymity for bitcoin from secure escrow address [J]. IEEE Access, 2018, 6: 12336-12341.
[21] ZIEGELDORF J H, MATZUTT R, HENZE M, et al. Secure and anonymous decentralized Bitcoin mixing [J]. Future Generation Computer Systems, 2018, 80: 448-466.
[22] GENNARO R, JARECKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems [J]. Journal of Cryptology, 2007, 20(1): 51-83.
[23] SPAGNUOLO M, MAGGI F, ZANERO S. BitIodine: extracting intelligence from the bitcoin network [C]//Financial Cryptography and Data Security. Berlin: Springer, 2014: 457-468.
[1] Dong Zhen-ning, Wang Jun-jie, Luo Ke-wen, Chen Lang-cheng. An Evolutionary Game Analysis of Online Car-hailing Passengers' Privacy Protection [J]. Journal of Guangdong University of Technology, 2023, 40(01): 19-28.
[2] ZHAO Guang-Qiang, LING Jie. Anonymous Authentication Protocol Based on Bilinear Pairing and Nonce in Cloud Computing [J]. Journal of Guangdong University of Technology, 2014, 31(3): 67-71.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!