Secure joint Bitcoin trading with partially blind fuzzy signatures

被引:6
作者
Wu, Qianhong [1 ]
Zhou, Xiuwen [1 ]
Qin, Bo [2 ]
Hu, Jiankun [3 ]
Liu, Jianwei [1 ]
Ding, Yong [4 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, XueYuan Rd 37, Beijing, Peoples R China
[2] Renmin Univ China, Sch Informat, Key Lab Data Engn & Knowledge Engn, Minist Educ, Zhongguancun St 59, Beijing, Peoples R China
[3] Univ New South Wales, Sch Engn & IT, Canberra, ACT 2600, Australia
[4] Guilin Univ Elect Technol, Sch Math & Comp Sci, Guangxi Key Lab Cryptog & Informat Secur, Jingji Rd 1, Guangxi 5410041, Peoples R China
基金
北京市自然科学基金;
关键词
Bitcoin; Threshold signature; Secret sharing; Soft computing; Partially blind fuzzy signature;
D O I
10.1007/s00500-015-1997-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Bitcoin has recently received considerable attentions in both academia and industrial areas. It is an appealing anonymous electronic cash system-based peer-to-peer computer networks and does not rely on any centralized trusted authority. The Bitcoin is associated with a public/secret key pair where the security key is only known by its Bitcoin account owner. It is usually hosted on some platform and can only be spent after its owner and the platform sign on it. In this paper, we investigate how to jointly manage the Bitcoin trading when the Bitcoin account is possessed by multiple participants and how to simultaneously guarantee the anonymity of the multiple owners. We first consider the scenario where a single dealer possesses the Bitcoin account but authorizes multiple participants to jointly manage it. For instance, a company authorizes its several departments to manage its account. We next consider the scenario where the Bitcoin account is shared by some peers, e.g., joint investigators each of whom independent possesses a part of the account. The main challenge is that the signers are uncertain in different transactions. We propose partially blind threshold signatures with uncertain signers and their extensions to address this challenge. Analysis shows that our proposals are secure and efficient.
引用
收藏
页码:3123 / 3134
页数:12
相关论文
empty
未找到相关数据