Abstract
A consortium blockchain is that multiple groups of authorized members that share one ledger. Transaction validation and membership authentication are executed by trusted nodes which create and store full block (a.k.a full node). Other lightweight nodes which stored only header block request validating transaction to full node. Therefore, because the lightweight node requesting of validation transaction and sharing ledger of members between groups in consortium blockchain creates a privacy problem. In this paper, we propose an anonymous protocol based on a credential system for privacy in a consortium blockchain. This solves the problem of computation overhead and privacy in the consortium blockchain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ra, G.J., Lee, I.Y.: A study on KSI-based authentication management and communication for secure smart home environments. KSII Trans. Internet Inf. Syst. 12(2), 892–904 (2018)
Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity — a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_1
Mercer, R.: Privacy on the blockchain: unique ring signatures. arXiv preprint arXiv:1612.01188 (2016)
Maksutov, A.A., Alexeev, M.S., Fedorova, N.O., Andreev, D.A.: Detection of blockchain transactions used in blockchain mixer of coin join type. In: IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 274–277. IEEE (2019)
Zhu, H., Tan, Y.A., Zhu, L., Wang, X., Zhang, Q., Li, Y.: An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors 18(5), 1663 (2018)
Au, M.H., Chow, S.S.M., Susilo, W., Tsang, P.P.: Short linkable ring signatures revisited. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 101–115. Springer, Heidelberg (2006). https://doi.org/10.1007/11774716_9
Paul, J., Xu, Q., Fei, S., Veeravalli, B., Aung, K.M.M.: Practically realisable anonymisation of bitcoin transactions with improved efficiency of the zerocoin protocol. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FICC 2018. AISC, vol. 887, pp. 108–130. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-03405-4_8
Groth, J., Kohlweiss, M., Maller, M., Meiklejohn, S., Miers, I.: Updatable and universal common reference strings with applications to zk-SNARKs. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10993, pp. 698–728. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96878-0_24
Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. (2018)
Morishima, S., Matsutani, H.: Accelerating blockchain search of full nodes using GPUs. In: 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 244–248. IEEE (2018)
Schukat, M., Cortijo, P.: Public key infrastructures and digital certificates for the Internet of Things. In: Signals and Systems Conference (ISSC), pp. 1–5 (2015)
Gu, K., Wu, N., Liu, Y., Yu, F., Yin, B.: WPKI certificate verification scheme based on certificate digest signature-online certificate status protocol. Math. Prob. Eng. (2018)
Zhu, X., Su, Y., Gao, M., Huang, Y.: Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks. In: IEEE/CIC International Conference on Communications in China (ICCC), pp. 1–6. IEEE (2015)
Haghighat, M.H., Tavakoli, M., Kharrazi, M.: Payload attribution via character dependent multi-bloom filters. IEEE Trans. Inf. Forensics Secur. 8(5), 705–716 (2013)
Acknowledgements
This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2019-0-00403) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ra, GJ., Seo, D., Bhuiyan, M.Z.A., Lee, IY. (2019). An Anonymous Protocol for Member Privacy in a Consortium Blockchain. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-24907-6_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24906-9
Online ISBN: 978-3-030-24907-6
eBook Packages: Computer ScienceComputer Science (R0)