Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2022

29-03-2022

A privacy-preserving and efficient byzantine consensus through multi-signature with ring

Authors: Xiaohua Wu, Hongji Ling, Huan Liu, Fangjian Yu

Published in: Peer-to-Peer Networking and Applications | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The consortium blockchain has three challenges in terms of performance, security, and privacy when adopting the Practical Byzantine Fault Tolerance (PBFT) protocol. The throughput and scalability of consortium blockchain are focused on meanwhile the privacy protection can hardly be ignored. This work proposes a privacy-preserving multi-signature and hierarchical Byzantine consensus protocol. Specifically, the signature combines a ring signature and a Schnorr one to provide three levels of privacy protection. The consensus protocol layers the network nodes into different clusters, which overcomes the shortcomings of PBFT and Schnorr signature. The theoretical analysis proves the security and privacy of the protocol and expounds the application scenarios, and the efficiency evaluation shows that the signature verification speed is 6.28 times faster than the Schnorr scheme, and the consensus in a 250-nodes network is 51.3% faster than the Schnorr-based PBFT consensus.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1–32 Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151:1–32
4.
go back to reference Conti M, Kumar ES, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. IEEE Communications Surveys & Tutorials 20(4):3416–3452CrossRef Conti M, Kumar ES, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. IEEE Communications Surveys & Tutorials 20(4):3416–3452CrossRef
5.
go back to reference Zamani M, Movahedi M, Raykova M (2018) Rapidchain: Scaling blockchain via full sharding. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security pp 931–948 Zamani M, Movahedi M, Raykova M (2018) Rapidchain: Scaling blockchain via full sharding. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security pp 931–948
6.
go back to reference Kokoris-Kogias E, Jovanovic P, Gasser L, Gailly N, Syta E, Ford B (2018) Omniledger: A secure, scale-out, decentralized ledger via sharding. 2018 IEEE Symposium on Security and Privacy (SP) pp 583–598 Kokoris-Kogias E, Jovanovic P, Gasser L, Gailly N, Syta E, Ford B (2018) Omniledger: A secure, scale-out, decentralized ledger via sharding. 2018 IEEE Symposium on Security and Privacy (SP) pp 583–598
7.
go back to reference Gilad Y, Hemo R, Micali S, Vlachos G, Zeldovich N (2017) Algorand: Scaling byzantine agreements for cryptocurrencies. Proceedings of the 26th Symposium on Operating Systems Principles pp 51–68 Gilad Y, Hemo R, Micali S, Vlachos G, Zeldovich N (2017) Algorand: Scaling byzantine agreements for cryptocurrencies. Proceedings of the 26th Symposium on Operating Systems Principles pp 51–68
8.
go back to reference Feng X, Ma J, Miao Y, Meng Q, Liu X, Jiang Q, Li H (2019) Pruneable sharding-based blockchain protocol. Peer-to-Peer Netwo Appl 12(4):934–950CrossRef Feng X, Ma J, Miao Y, Meng Q, Liu X, Jiang Q, Li H (2019) Pruneable sharding-based blockchain protocol. Peer-to-Peer Netwo Appl 12(4):934–950CrossRef
9.
go back to reference Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. OSDI 99:173–186 Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. OSDI 99:173–186
10.
go back to reference Kogias EK, Jovanovic P, Gailly N, Khoffi I, Gasser L, Ford B (2016) Enhancing bitcoin security and performance with strong consistency via collective signing. 25th \(\{\)usenix\(\}\) security symposium (\(\{\)usenix\(\}\) security 16) pp 279–296 Kogias EK, Jovanovic P, Gailly N, Khoffi I, Gasser L, Ford B (2016) Enhancing bitcoin security and performance with strong consistency via collective signing. 25th \(\{\)usenix\(\}\) security symposium (\(\{\)usenix\(\}\) security 16) pp 279–296
11.
go back to reference Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et al. (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. Proceedings of the thirteenth EuroSys conference pp 1–15 Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y, et al. (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. Proceedings of the thirteenth EuroSys conference pp 1–15
12.
go back to reference Bessani A, Sousa J, Alchieri EE (2014) State machine replication for the masses with bft-smart. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks pp 355–362 Bessani A, Sousa J, Alchieri EE (2014) State machine replication for the masses with bft-smart. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks pp 355–362
13.
go back to reference Sousa J, Bessani A (2012) From byzantine consensus to bft state machine replication: A latency-optimal transformation. 2012 Ninth European Dependable Computing Conference pp 37–48 Sousa J, Bessani A (2012) From byzantine consensus to bft state machine replication: A latency-optimal transformation. 2012 Ninth European Dependable Computing Conference pp 37–48
14.
go back to reference Ristenpart T, Yilek S (2007) The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks. Annual International Conference on the Theory and Applications of Cryptographic Techniques pp 228–245 Ristenpart T, Yilek S (2007) The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks. Annual International Conference on the Theory and Applications of Cryptographic Techniques pp 228–245
15.
go back to reference Li CM, Hwang T, Lee NY (1994) Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. Workshop on the Theory and Application of of Cryptographic Techniques pp 194–204 Li CM, Hwang T, Lee NY (1994) Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. Workshop on the Theory and Application of of Cryptographic Techniques pp 194–204
16.
go back to reference Harn L (1994) Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proceedings-Computers and Digital Techniques 141(5):307–313CrossRef Harn L (1994) Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proceedings-Computers and Digital Techniques 141(5):307–313CrossRef
17.
go back to reference Horster P, Michels M, Petersen H (1995) Meta-multisignature schemes based on the discrete logarithm problem. Information Security the Next Decade pp 128–142 Horster P, Michels M, Petersen H (1995) Meta-multisignature schemes based on the discrete logarithm problem. Information Security the Next Decade pp 128–142
18.
go back to reference Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. International Conference on the Theory and Application of Cryptology and Information Security pp 552–565 Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. International Conference on the Theory and Application of Cryptology and Information Security pp 552–565
19.
go back to reference Blum M, Feldman P, Micali S (1988) Non-interactive zero-knowledge and its applications. Proceedings of the twentieth annual ACM symposium on Theory of computing pp 103–112 Blum M, Feldman P, Micali S (1988) Non-interactive zero-knowledge and its applications. Proceedings of the twentieth annual ACM symposium on Theory of computing pp 103–112
20.
go back to reference Wu H, Wang F (2014) A survey of noninteractive zero knowledge proof system and its applications. Sci World J Wu H, Wang F (2014) A survey of noninteractive zero knowledge proof system and its applications. Sci World J
22.
go back to reference Maxwell G, Poelstra A, Seurin Y, Wuille P (2018) Simple schnorr multi-signatures with applications to bitcoin. Des Codes Crypt 87(9):2139–2164MathSciNetCrossRef Maxwell G, Poelstra A, Seurin Y, Wuille P (2018) Simple schnorr multi-signatures with applications to bitcoin. Des Codes Crypt 87(9):2139–2164MathSciNetCrossRef
24.
go back to reference Li P, Wang G, Chen X, Long F, Xu W (2020) Gosig: a scalable and high-performance byzantine consensus for consortium blockchains. Proceedings of the 11th ACM Symposium on Cloud Computing pp 223–237 Li P, Wang G, Chen X, Long F, Xu W (2020) Gosig: a scalable and high-performance byzantine consensus for consortium blockchains. Proceedings of the 11th ACM Symposium on Cloud Computing pp 223–237
25.
go back to reference Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur 1(1):36–63CrossRef Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur 1(1):36–63CrossRef
26.
go back to reference Li Y, Qiao L, Lv Z (2021) An optimized byzantine fault tolerance algorithm for consortium blockchain. Peer-to-Peer Networking and Applications pp 1–14 Li Y, Qiao L, Lv Z (2021) An optimized byzantine fault tolerance algorithm for consortium blockchain. Peer-to-Peer Networking and Applications pp 1–14
27.
go back to reference Bresson E, Stern J, Szydlo M (2002) Threshold ring signatures and applications to ad-hoc groups. Annual International Cryptology Conference pp 465–480 Bresson E, Stern J, Szydlo M (2002) Threshold ring signatures and applications to ad-hoc groups. Annual International Cryptology Conference pp 465–480
28.
go back to reference Chow SS, Hui LC, Yiu SM (2004) Identity based threshold ring signature. International Conference on Information Security and Cryptology pp 218–232 Chow SS, Hui LC, Yiu SM (2004) Identity based threshold ring signature. International Conference on Information Security and Cryptology pp 218–232
29.
go back to reference Herranz J, Sáez G (2004) Distributed ring signatures for identity-based scenarios. IACR Cryptol ePrint Arch Herranz J, Sáez G (2004) Distributed ring signatures for identity-based scenarios. IACR Cryptol ePrint Arch
30.
go back to reference Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. International Conference on the Theory and Applications of Cryptographic Techniques pp 416–432 Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. International Conference on the Theory and Applications of Cryptographic Techniques pp 416–432
31.
go back to reference Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. International conference on the theory and application of cryptology and information security pp 514–532 Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. International conference on the theory and application of cryptology and information security pp 514–532
32.
go back to reference Drijvers M, Edalatnejad K, Ford B, Kiltz E, Loss J, Neven G, Stepanovs I (2019) On the security of two-round multi-signatures. 2019 IEEE Symposium on Security and Privacy (SP) pp 1084–1101 Drijvers M, Edalatnejad K, Ford B, Kiltz E, Loss J, Neven G, Stepanovs I (2019) On the security of two-round multi-signatures. 2019 IEEE Symposium on Security and Privacy (SP) pp 1084–1101
33.
go back to reference Damgård I, Orlandi C, Takahashi A, Tibouchi M (2021) Two-round n-out-of-n and multi-signatures and trapdoor commitment from lattices. IACR International Conference on Public-Key Cryptography pp 99–130 Damgård I, Orlandi C, Takahashi A, Tibouchi M (2021) Two-round n-out-of-n and multi-signatures and trapdoor commitment from lattices. IACR International Conference on Public-Key Cryptography pp 99–130
34.
go back to reference Goodell B, Noether S (2018) Thring signatures and their applications to spender-ambiguous digital currencies. IACR Cryptol ePrint Arch Goodell B, Noether S (2018) Thring signatures and their applications to spender-ambiguous digital currencies. IACR Cryptol ePrint Arch
35.
go back to reference Leiba O, Yitzchak Y, Bitton R, Nadler A, Shabtai A (2018) Incentivized delivery network of iot software updates based on trustless proof-of-distribution. 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) pp 29–39 Leiba O, Yitzchak Y, Bitton R, Nadler A, Shabtai A (2018) Incentivized delivery network of iot software updates based on trustless proof-of-distribution. 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) pp 29–39
36.
go back to reference Badr MM, Al Amiri W, Fouda MM, Mahmoud MM, Aljohani AJ, Alasmary W (2020) Smart parking system with privacy preservation and reputation management using blockchain. IEEE Access 8:150823–150843CrossRef Badr MM, Al Amiri W, Fouda MM, Mahmoud MM, Aljohani AJ, Alasmary W (2020) Smart parking system with privacy preservation and reputation management using blockchain. IEEE Access 8:150823–150843CrossRef
37.
go back to reference Nick J, Ruffing T, Seurin Y, Wuille P (2020) Musig-dn: Schnorr multi-signatures with verifiably deterministic nonces. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security pp 1717–1731 Nick J, Ruffing T, Seurin Y, Wuille P (2020) Musig-dn: Schnorr multi-signatures with verifiably deterministic nonces. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security pp 1717–1731
38.
go back to reference Nick J, Ruffing T, Seurin Y (2021) Musig2: Simple two-round schnorr multi-signatures. Annual International Cryptology Conference pp 189–221 Nick J, Ruffing T, Seurin Y (2021) Musig2: Simple two-round schnorr multi-signatures. Annual International Cryptology Conference pp 189–221
Metadata
Title
A privacy-preserving and efficient byzantine consensus through multi-signature with ring
Authors
Xiaohua Wu
Hongji Ling
Huan Liu
Fangjian Yu
Publication date
29-03-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2022
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01317-4

Other articles of this Issue 3/2022

Peer-to-Peer Networking and Applications 3/2022 Go to the issue

Premium Partner