Skip to main content

Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs

  • Conference paper
  • First Online:
Network and System Security (NSS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11058))

Included in the following conference series:


IOTA, one of the largest cryptocurrencies in the world, is a platform that links together Internet of Things (IoT) devices and is specifically built for fee-free machine-to-machine micropayments and messaging. One of IOTA’s core features is the Tangle - which is a new distributed ledger concept that tracks all payments and interactions. Despite its new features, there are some potential privacy issues associated when users combine the ubiquity and integration of the IoT and machine-to-machine transactions in our foreseeable future. In this paper, we describe an implementation that Bulletproof technique [9] with the IOTA platform to allow the hiding of transaction values and user balances.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others


  1. 1.

    It is yet to be seen whether this claim is true in the long run, but there is evidence that it is not true is all cases, which will be covered in the background section.

  2. 2.

    As we were working in Go, we have modified a Go implementation of the Bulletproofs paper - there are a few slight differences to the generator than in the reference implementation-

  3. 3.

    It is worth noting that anything negative about IOTA on the web quickly attacks many critics; so the veracity of the claims in the article are also open to discussion.

  4. 4.

    David Sønstebø explaining the choice to use Ternary -

  5. 5.

  6. 6.

  7. 7.

    In the cryptocurrency space that we are examining, this would allow the party hiding the value to double-spend their coins, thus creating new coins that should not exist.

  8. 8.

    For a complete breakdown of the algorithms used to determine these criteria, see Sect. A.1 in [4].

  9. 9.

    To see a detailed example of the formula for the Proof of knowledge, see Sect. A.2 in [4].

  10. 10.

    For the zero knowledge formula, see Sect. A.3 in [4].

  11. 11.

    The different ways to create a Bitcoin wallet can be found on their official documentation -


  1. Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34–51. Springer, Heidelberg (2013).

    Chapter  Google Scholar 

  2. Ashton, K.: That ‘Internet of Things’ Thing - 2009-06-22 - Page 1 - RFID Journal (2009).

  3. Back, A.: Hashcash - a denial of service counter-measure, pp. 1–10, August 2002. http://www.Hashcash.Org/Papers/Hashcash.Pdf

  4. Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E., Virza, M.: SNARKs for C: verifying program executions succinctly and in zero knowledge. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 90–108. Springer, Heidelberg (2013).

    Chapter  MATH  Google Scholar 

  5. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in Bitcoin P2P network (2014).

  6. Bitansky, N., Chiesa, A., Ishai, Y., Paneth, O., Ostrovsky, R.: Succinct non-interactive arguments via linear interactive proofs. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 315–333. Springer, Heidelberg (2013).

    Chapter  Google Scholar 

  7. Blakley, G.: Safeguarding cryptographic keys. In: AFIPS, p. 313 (1979)

    Google Scholar 

  8. Buntix, J.: IOTA Network Struggles Due to Lack of Full Nodes - The Merkle (2017).

  9. Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.:Bulletproofs: Efficient Range Proofs for Confidential Transactions. Cryptology ePrint Archive (2017).,

  10. Buterin, V.: Ethereum Whitepaper (2015).

  11. Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469–485. Springer, Heidelberg (2014).

    Chapter  Google Scholar 

  12. Maxwell, G.: Confidential Transactions, Content Privacy for Bitcoin Transactions (2015).

  13. Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61–66. ACM (2010)

    Google Scholar 

  14. Najera, J.: Cryptos In 3 Mins – IOTA – SetOcean – Medium (2017).

  15. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008).

  16. Pedersen, T.P.: Distributed provers with applications to undeniable signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 221–242. Springer, Heidelberg (1991).

    Chapter  Google Scholar 

  17. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992).

    Chapter  Google Scholar 

  18. Poelstra, A.: Mimblewimble, 1–19 June 2016.

  19. Poelstra, A., Back, A., Friedenbach, M., Maxwell, G., Blockstream, P.W.: Confidential Assets.

  20. Popov, S.: The Tangle (2016).

  21. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system BT - security and privacy in social networks. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013).

    Google Scholar 

  22. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013).

    Chapter  Google Scholar 

  23. Shamir, A., Shamir, A.: How to share a secret. Commun. ACM (CACM) 22(1), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  24. Tennant, L.: Improving the Anonymity of the IOTA Cryptocurrency (2017).

  25. Tennant, L.: Privacy in IOTA – IOTA @ UCL– Medium - 05/08/2017 (2017).

Download references


This work was supported by the National Natural Science Foundation of China (61702342), the Science and Technology Innovation Projects of Shenzhen (GJHZ 20160226202520268, JCYJ 20170302151321095, JCYJ 20170302145623566) and Tencent “Rhinoceros Birds” - Scientific Research Foundation for Young Teachers of Shenzhen University.

Author information

Authors and Affiliations


Corresponding authors

Correspondence to Peter Ince , Joseph K. Liu or Peng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ince, P., Liu, J.K., Zhang, P. (2018). Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs. In: Au, M., et al. Network and System Security. NSS 2018. Lecture Notes in Computer Science(), vol 11058. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02743-8

  • Online ISBN: 978-3-030-02744-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics