ABSTRACT
In this paper, we propose a system for mixing transactions in payment networks such as credit networks. Credit networks like Ripple and Stellar are increasingly popular, and can facilitate crosscurrency transactions in a fraction of the time it would take for banks or other financial institutions to process the same transaction, and at a fraction of the cost. Unlike for cryptocurrencies, there has been little work in the area of designing secure and private mixers for credit networks. Mixers for cryptocurrencies such as Bitcoin cannot be directly applied to the credit network domain because credit networks have an inherently different structure and purpose than cryptocurrencies. We design a system that uses cryptographic constructs such as ring signatures, commitments, and zero knowledge proofs to provide security/integrity of all transactions, ensures privacy of the users involved in a transaction, as well as privacy of the amount transacted. We also provide preliminary experimental results.
- Abe, M., Ohkubo, M., and Suzuki, K. 1-out-of-n signatures from a variety of keys. IEICE Transactions 87-A, 1 (2004), 131--140.Google Scholar
- Akinyele, J. A., Garman, C., Miers, I., Pagano, M. W., Rushanan, M., Green, M., and Rubin, A. D. Charm: a framework for rapidly prototyping cryptosystems. J. Cryptographic Engineering 3, 2 (2013), 111--128.Google ScholarCross Ref
- Coinbase. https://www.coinbase.com/.Google Scholar
- Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J. A., and Felten, E. W. Mixcoin: Anonymity for bitcoin with accountable mixes. IACR Cryptology ePrint Archive 2014 (2014), 77.Google Scholar
- Bulck, J. V., Minkin, M., Weisse, O., Genkin, D., Kasikci, B., Piessens, F., Silberstein, M., Wenisch, T. F., Yarom, Y., and Strackx, R. Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. In USENIX Security Symposium (2018), USENIX Association, pp. 991--1008. Google ScholarDigital Library
- Canetti, R. Universally composable security: A new paradigm for cryptographic protocols. IACR Cryptology ePrint Archive 2000 (2000), 67.Google Scholar
- Dannen, C. Bridging the Blockchain Knowledge Gap. In Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners, C. Dannen, Ed. Apress, Berkeley, CA, 2017, pp. 1--20. Google ScholarDigital Library
- Dziembowski, S., Eckey, L., Faust, S., and Malinowski, D. Perun: Virtual payment channels over cryptographic currencies. Tech. rep., IACR Cryptology ePrint Archive, 2017: 635, 2017.Google Scholar
- Feigenbaum, J. Overview of interactive proof systems and zero-knowledge. Contemporary Cryptology: The Science of Information Integrity (1992), 423--439.Google Scholar
- Gu, K., and Wu, N. Constant size traceable ring signature scheme without random oracles. IACR Cryptology ePrint Archive 2018 (2018), 288.Google Scholar
- Heilman, E., Baldimtsi, F., Alshenibr, L., Scafuro, A., and Goldberg, S. Tumblebit: An untrusted tumbler for bitcoin-compatible anonymous payments. IACR Cryptology ePrint Archive 2016 (2016), 575.Google Scholar
- Khalil, R., and Gervais, A. Revive: Rebalancing off-blockchain payment networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017), ACM, pp. 439--453. Google ScholarDigital Library
- Khalil, R., and Gervais, A. Nocust--a non-custodial 2 nd-layer financial intermediary. Tech. rep., Cryptology ePrint Archive, Report 2018/642. https://eprint. iacr. org/2018/642, 2018.Google Scholar
- Lind, J., Eyal, I., Kelbert, F., Naor, O., Pietzuch, P., and Sirer, E. G. Teechain: Scalable blockchain payments using trusted execution environments. arXiv preprint arXiv:1707.05454 (2017).Google Scholar
- Malavolta, G., Moreno-Sanchez, P., Kate, A., and Maffei, M. Silentwhispers: Enforcing security and privacy in decentralized credit networks. IACR Cryptology ePrint Archive 2016 (2016), 1054.Google Scholar
- Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., and Ravi, S. Concurrency and privacy with payment-channel networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017), ACM, pp. 455--471. Google ScholarDigital Library
- Maxwell, G. Coinjoin: Bitcoin privacy for the real world. In Post on Bitcoin forum (2013).Google Scholar
- Maxwell, G. Coinswap: Transaction graph disjoint trustless trading. CoinSwap: Transactiongraphdisjointtrustlesstrading (October 2013) (2013).Google Scholar
- Maxwell, G., and Poelstra, A. Borromean ring signatures, 2015.Google Scholar
- Moreno-Sanchez, P., Ruffing, T., and Kate, A. Pathshuffle: Credit mixing and anonymous payments for ripple. Proceedings on Privacy Enhancing Technologies 2017, 3 (2017), 110--129.Google ScholarCross Ref
- Panwar, G., Misra, S., and Vishwanathan, R. Blanc: Blockchain-based anonymous and decentralized credit networks. IACR Cryptology ePrint Archive 2019 (2019), 14. Google ScholarDigital Library
- Poon, J., and Dryja, T. The bitcoin lightning network: Scalable off-chain instant payments. See https://lightning. network/lightning-network-paper. pdf (2016).Google Scholar
- Ripple website. www.ripple.com, 2015.Google Scholar
- Rivest, R. L., Shamir, A., and Tauman, Y. How to leak a secret. In ASIACRYPT (2001), vol. 2248 of Lecture Notes in Computer Science, Springer, pp. 552--565. Google ScholarDigital Library
- Roos, S., Moreno-Sanchez, P., Kate, A., and Goldberg, I. Settling payments fast and private: Efficient decentralized routing for path-based transactions. CoRR (2017).Google Scholar
- Ruffing, T., Moreno-Sanchez, P., and Kate, A. Coinshuffle: Practical decentralized coin mixing for bitcoin. In ESORICS (2) (2014), vol. 8713 of Lecture Notes in Computer Science, Springer, pp. 345--364. Google ScholarDigital Library
- Ruffing, T., Moreno-Sanchez, P., and Kate, A. P2P mixing and unlinkable bitcoin transactions. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017 (2017), The Internet Society.Google ScholarCross Ref
- Shamir, A. How to share a secret. Commun. ACM 22, 11 (1979), 612--613. Google ScholarDigital Library
- Stellar website. https://www.stellar.org/.Google Scholar
- Tang, C., Pei, D., Liu, Z., and He, Y. Non-interactive and information-theoretic secure publicly verifiable secret sharing. IACR Cryptology ePrint Archive 2004 (2004), 201.Google Scholar
Index Terms
- Private and Secure Mixing in Credit Networks
Recommendations
Digital blockchain networks appear to be following Metcalfes Law
Public ledger systems provide us a wealth of information for their network analysis.Network effects on the growth of some of the networks was confirmed.A new network model presented here modeled the networks well as did Metcalfes law.The networks value ...
Introduction to Credit Networks: Security, Privacy, and Applications
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityCredit networks model transitive IOweYou (IOU) credit between their users. With their flexible-yet-scalable design and robustness against intrusion, we are observing a rapid increase in their popularity as a backbone of real-world permission-less ...
Enhancing user and transaction privacy in bitcoin with unlinkable coin mixing scheme
The concept of coin mixing is significant in blockchain and achieves anonymity and has merited application in bitcoin. Albeit, several coin mixing schemes have been proposed, we point out that they either hoard input transactions and address mapping or ...
Comments