Distributed auditing protocol for blockchain-based transactions using a distributed signature

被引:7
作者
Far, Saeed Banaeian [1 ]
Rad, Azadeh Imani [2 ]
机构
[1] Islamic Azad Univ, Dept Elect & Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Islamic Azad Univ, Yadegar E Imam Khomeini Rah Shahr E Rey Branch, Dept Elect Engn, Tehran, Iran
关键词
blockchain; confidential transaction; distributed auditing; distributed signature; ENCRYPTION;
D O I
10.1002/spy2.156
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data privacy is a developing issue in the cyberspace. Users who send something through a public network want their data to be kept confidential. Service providers, in like manner, need to store valid data and avoid storing invalid data. Auditing protocols provide data validity and prevent the storing of invalid data. However, some problems including cooperation with a malicious auditor to register invalid data, deleting registered data, obtaining private data by service providers, and attacks to the network's point of failure still exists. This paper presents a blockchain-based protocol to audit transactions transferred on a blockchain called the DA-DS protocol. The blockchain is applied in the DA-DS protocol to provide immutability for stored data and distribute the network's point of failure. A distributed signature based on the ElGamal cryptosystem is applied in this paper for auditors and the ElGamal-based encryption algorithm to provide transaction confidentiality since the ElGamal cryptosystem does not provide key escrow. Therefore, users join the network have a security against privileged insider adversaries. In the DA-DS protocol, each confidential transaction is audited, off-chain, by all auditors. The audited transaction is then sent to the central authority for verification, and the central authority submits the audited transaction on the blockchain if the verification process is done successfully. Finally, in this paper, a security analysis of the DA-DS protocol is provided in the random oracle (RO) model. Subsequently, the performance was compared with other recently proposed auditing protocols, the result of which has shown that it higher efficiency.
引用
收藏
页数:18
相关论文
共 36 条
[1]   Adoption of blockchain technology in various realms: Opportunities and challenges [J].
Akram, Shaik V. ;
Malik, Praveen K. ;
Singh, Rajesh ;
Anita, Gehlot ;
Tanwar, Sudeep .
SECURITY AND PRIVACY, 2020, 3 (05)
[2]  
[Anonymous], 2013, INT C NETW SYST SEC
[3]   A taxonomy for key escrow encryption systems [J].
Denning, DE ;
Branstad, DK .
COMMUNICATIONS OF THE ACM, 1996, 39 (03) :34-39
[4]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[5]   Consortium Blockchain Based Data Aggregation and Regulation Mechanism for Smart Grid [J].
Fan, Mochan ;
Zhang, Xiaohong .
IEEE ACCESS, 2019, 7 :35929-35940
[6]   Research on privacy enhancement scheme of blockchain transactions [J].
Feng, Tao ;
Chen, Xuan ;
Liu, Chunyan ;
Feng, Xiaoqin .
SECURITY AND PRIVACY, 2019, 2 (06)
[7]   Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid [J].
Gai, Keke ;
Wu, Yulu ;
Zhu, Liehuang ;
Qiu, Meikang ;
Shen, Meng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (06) :3548-3558
[8]   InfiniteChain: A Multi-chain Architecture with Distributed Auditing of Sidechains for Public Blockchains [J].
Hwang, Gwan-Hwan ;
Chen, Po-Han ;
Lu, Chun-Hao ;
Chiu, Chun ;
Lin, Hsuan-Cheng ;
Jheng, An-Jie .
BLOCKCHAIN - ICBC 2018, 2018, 10974 :47-60
[9]   A survey of blockchain security issues and challenges [J].
Lin, Iuon-Chang ;
Liao, Tzu-Chun .
International Journal of Network Security, 2017, 19 (05) :653-659
[10]  
Kaaniche N, 2017, 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), P403