skip to main content
research-article

Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain

Authors Info & Claims
Published:05 January 2021Publication History
Skip Abstract Section

Abstract

In blockchain networks, reaching effective supervision while maintaining anonymity to the public has been an ongoing challenge. In existing solutions, certification authorities need to record all pairs of identities and pseudonyms, which is demanding and costly. This article proposed an account guarantee scheme to realize feasible supervision for existing anonymous blockchain networks with lower storage costs. Users are able to guarantee anonymous accounts with account guarantee key pairs generated from certificated polynomial functions, which inherently maintains one-to-n mapping certifications. Single or limited account guarantee key pairs do not leak privacy. Victims are able to request TCs to screen a cheater or disclose a cheater with enough fraud transactions by themselves. Detailed security and privacy analysis showed that the account guarantee scheme preserves user privacy and realizes feasible supervision. Experimental results demonstrated that the account guarantee scheme is efficient and practical.

References

  1. Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 459--474. DOI:https://doi.org/10.1109/SP.2014.36Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Weili Chen, Zibin Zheng, Jiahui Cui, Edith Ngai, Peilin Zheng, and Yuren Zhou. 2018. Detecting Ponzi schemes on Ethereum: Towards healthier blockchain technology. In Proceedings of the World Wide Web Conference, Vol. 4. ACM, 1409--1418. DOI:https://doi.org/10.1145/3178876.3186046Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, and Wei Wang. 2019. Polynomial-based modifiable blockchain structure for removing fraud transactions. Fut. Gen. Comput. Syst. 99 (Oct. 2019), 154--163. DOI:https://doi.org/10.1016/J.FUTURE.2019.04.028Google ScholarGoogle Scholar
  4. Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, and Wei Wang. 2019. SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs. IEEE Trans. Computat. Soc. Syst. (2019), 1--10. DOI:https://doi.org/10.1109/TCSS.2019.2904633Google ScholarGoogle Scholar
  5. Christian Cachin. 2016. Architecture of the Hyperledger Blockchain Fabric. Retrieved from https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf.Google ScholarGoogle Scholar
  6. Hong-Ning Dai, Zibin Zheng, and Yan Zhang. 2019. Blockchain for Internet of Things: A survey. IEEE Internet Things J. 6, 5 (2019), 8076--8094. DOI:https://doi.org/10.1109/JIOT.2019.2920987Google ScholarGoogle ScholarCross RefCross Ref
  7. Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, and Ji Wang. 2018. Untangling blockchain: A data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30, 7 (2018), 1366--1385. DOI:https://doi.org/10.1109/TKDE.2017.2781227Google ScholarGoogle ScholarCross RefCross Ref
  8. Ethereum. 2018. Ethereum Project. Retrieved from https://www.ethereum.org/.Google ScholarGoogle Scholar
  9. Michael Fleder, Michael S. Kester, and Sudeep Pillai. 2015. Bitcoin transaction graph analysis. arXiv (2015), 1--8. arxiv:1502.01657v1Google ScholarGoogle Scholar
  10. Thomas Hardjono and Alex Pentland. 2019. Verifiable anonymous identities and access control in permissioned blockchains. Retrieved from http://connection.mit.edu/wp-content/uploads/sites/29/2014/12/ChainAnchor-Identities-04172016.pdf.Google ScholarGoogle Scholar
  11. Nicholas J. Higham. 2004. The numerical stability of barycentric Lagrange interpolation. IMA J. Numer. Anal. 24, 4 (Oct. 2004), 547--556. Retrieved from https://academic.oup.com/imajna/article-abstract/24/4/547/687371Google ScholarGoogle ScholarCross RefCross Ref
  12. Yutao Jiao, Ping Wang, Dusit Niyato, and Kongrath Suankaewmanee. 2019. Auction mechanisms in cloud/fog computing resource allocation for public blockchain networks. IEEE Trans. Parallel Distrib. Syst. 30, 9 (2019), 1975--1989. DOI:https://doi.org/10.1109/TPDS.2019.2900238Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Nam-Yong Lee, Jinhong Yang, Md Mehedi Hassan Onik, and Chul-Soo Kim. 2019. Modifiable public blockchains using truncated hashing and sidechains. IEEE Access 7 (2019), 173571--173582. DOI:https://doi.org/10.1109/ACCESS.2019.2956628Google ScholarGoogle ScholarCross RefCross Ref
  14. Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, and Xiangliang Zhang. 2018. CreditCoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transport. Syst. 19, 7 (July 2018), 2204--2220. DOI:https://doi.org/10.1109/TITS.2017.2777990Google ScholarGoogle ScholarCross RefCross Ref
  15. Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang, and Xiangliang Zhang. 2020. Privacy risk analysis and mitigation of analytics libraries in the Android ecosystem. IEEE Trans. Mob. Comput. 19, 5 (May 2020), 1184--1199. DOI:https://doi.org/10.1109/TMC.2019.2903186Google ScholarGoogle ScholarCross RefCross Ref
  16. Yinqiu Liu, Kun Wang, Yun Lin, and Wenyao Xu. 2019. LightChain: A lightweight blockchain system for industrial Internet of Things. IEEE Trans. Industr. Inform. 15, 6 (2019), 3571--3581. DOI:https://doi.org/10.1109/TII.2019.2904049Google ScholarGoogle ScholarCross RefCross Ref
  17. R. Lowen. 1990. A fuzzy Lagrange interpolation theorem. Fuzzy Sets Syst. 34, 1 (Jan. 1990), 33--38. DOI:https://doi.org/10.1016/0165-0114(90)90124-OGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  18. Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. 2016. Making smart contracts smarter. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). ACM Press, New York, NY, 254--269. DOI:https://doi.org/10.1145/2976749.2978309Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Meijering. 2002. A chronology of interpolation: From ancient astronomy to modern signal and image processing. Proc. IEEE, Vol. 90. 319--342. DOI:https://doi.org/10.1109/5.993400Google ScholarGoogle ScholarCross RefCross Ref
  20. Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 397--411. DOI:https://doi.org/10.1109/SP.2013.34Google ScholarGoogle Scholar
  21. Monero. 2018. Monero—Secure, private, untraceable. Retrieved from https://getmonero.org/.Google ScholarGoogle Scholar
  22. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Www.Bitcoin.Org (2008). DOI:https://doi.org/10.1007/s10838-008-9062-0 arxiv:43543534534v343453.Google ScholarGoogle Scholar
  23. Abdullah Al Omar, Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Mohammad Shahriar Rahman. 2019. Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Fut. Gen. Comput. Syst. 95 (June 2019), 511--521. DOI:https://doi.org/10.1016/j.future.2018.12.044Google ScholarGoogle Scholar
  24. Serguei Popov. 2018. The Tangle. Retrieved from https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf.Google ScholarGoogle Scholar
  25. Ripple. 2018. Ripple—One Frictionless Experience to Send Money Globally | Ripple. Retrieved from https://ripple.com/.Google ScholarGoogle Scholar
  26. Khaled Salah, M. Habib Ur Rehman, Nishara Nizamuddin, and Ala Al-Fuqaha. 2019. Blockchain for AI: Review and open research challenges. IEEE Access 7 (2019), 10127--10149. DOI:https://doi.org/10.1109/ACCESS.2018.2890507Google ScholarGoogle ScholarCross RefCross Ref
  27. Thomas Sauer and Yuan Xu. 1995. On multivariate Lagrange interpolation. Math. Comp. 64, 211 (Sept. 1995), 1147--1147. DOI:https://doi.org/10.1090/s0025-5718-1995-1297477-5Google ScholarGoogle ScholarCross RefCross Ref
  28. David Schwartz, Noah Youngs, and Arthur Britto. 2014. The ripple protocol consensus algorithm. Retrieved from https://ripple.com/files/ripple_consensus_whitepaper.pdf.Google ScholarGoogle Scholar
  29. Mohammad Shahriar Rahman, Abdullah Al Omar, Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Guojon Wang. 2020. Accountable cross-border data sharing using blockchain under relaxed trust assumption. IEEE Trans. Eng. Manag. (2020). DOI:https://doi.org/10.1109/TEM.2019.2960829Google ScholarGoogle Scholar
  30. Michele Spagnuolo, Federico Maggi, and Stefano Zanero. 2014. Bitiodine: Extracting intelligence from the bitcoin network. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8437. Springer Verlag, 457--468. DOI:https://doi.org/10.1007/978-3-662-45472-5_29Google ScholarGoogle Scholar
  31. Qi Tao, Xiaohui Cui, Xiaofang Huang, Angella M. Leigh, and Hehe Gu. 2019. Food safety supervision system based on hierarchical multi-domain blockchain network. IEEE Access 7 (2019), 51817--51826. DOI:https://doi.org/10.1109/ACCESS.2019.2911265Google ScholarGoogle ScholarCross RefCross Ref
  32. Buterin Vitalik. 2016. CRITICAL UPDATE Re: DAO Vulnerability—Ethereum Blog. Retrieved from https://blog.ethereum.org/2016/06/17/critical-update-re-dao-vulnerability/.Google ScholarGoogle Scholar
  33. Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, and Xiangliang Zhang. 2018. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Fut. Gen. Comput. Syst. 78 (Jan. 2018), 987--994. DOI:https://doi.org/10.1016/j.future.2017.01.019Google ScholarGoogle Scholar
  34. Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, and Jiqiang Liu. 2020. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511 (Feb. 2020), 284--296. DOI:https://doi.org/10.1016/j.ins.2019.09.024Google ScholarGoogle Scholar
  35. Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, and Chunhua Su. 2020. ContractWard: Automated vulnerability detection models for ethereum smart contracts. IEEE Trans. Netw. Sci. Eng. (Jan. 2020), 1--1. DOI:https://doi.org/10.1109/tnse.2020.2968505Google ScholarGoogle Scholar
  36. Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang. 2014. Exploring permission-induced risk in Android applications for malicious application detection. IEEE Trans. Inf. Forens. Secur. 9, 11 (Nov. 2014), 1869--1882. DOI:https://doi.org/10.1109/TIFS.2014.2353996Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Wei Wang, Mengxue Zhao, and Jigang Wang. 2019. Effective Android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J. Amb. Intell. Humaniz. Comput. 10, 8 (Aug. 2019), 3035--3043. DOI:https://doi.org/10.1007/s12652-018-0803-6Google ScholarGoogle Scholar
  38. E. Waring. 1779. Problems concerning Interpolations. By Edward Waring, M. D. F. R. S. and of the Institute of Bononia, Lucasian Professor of Mathematics in the University of Cambridge. Philos. Trans. Roy. Soc. London 69, 0 (Jan. 1779), 59--67. DOI:https://doi.org/10.1098/rstl.1779.0008Google ScholarGoogle Scholar
  39. Mingli Wu, Kun Wang, Xiaoqin Cai, Song Guo, Minyi Guo, and Chunming Rong. 2019. A comprehensive survey of blockchain: From theory to IoT applications and beyond. IEEE Internet Things J. 6, 5 (2019), 8114--8154. DOI:https://doi.org/10.1109/JIOT.2019.2922538Google ScholarGoogle ScholarCross RefCross Ref
  40. Zehui Xiong, Shaohan Feng, Wenbo Wang, Dusit Niyato, Ping Wang, and Zhu Han. 2019. Cloud/fog computing resource management and pricing for blockchain networks. IEEE Internet Things J. 6, 3 (2019), 4585--4600. DOI:https://doi.org/10.1109/JIOT.2018.2871706Google ScholarGoogle ScholarCross RefCross Ref
  41. Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Xiangping Chen, and Huaimin Wang. 2018. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 14, 4 (2018), 352--375. DOI:https://doi.org/10.1504/IJWGS.2018.095647Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Internet Technology
              ACM Transactions on Internet Technology  Volume 21, Issue 1
              Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
              February 2021
              534 pages
              ISSN:1533-5399
              EISSN:1557-6051
              DOI:10.1145/3441681
              • Editor:
              • Ling Liu
              Issue’s Table of Contents

              Copyright © 2021 ACM

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 5 January 2021
              • Accepted: 1 June 2020
              • Revised: 1 May 2020
              • Received: 1 December 2019
              Published in toit Volume 21, Issue 1

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!