Skip to main content
Top
Published in: Soft Computing 11/2017

29-12-2015 | Methodologies and Application

Secure joint Bitcoin trading with partially blind fuzzy signatures

Authors: Qianhong Wu, Xiuwen Zhou, Bo Qin, Jiankun Hu, Jianwei Liu, Yong Ding

Published in: Soft Computing | Issue 11/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Bitcoin has recently received considerable attentions in both academia and industrial areas. It is an appealing anonymous electronic cash system-based peer-to-peer computer networks and does not rely on any centralized trusted authority. The Bitcoin is associated with a public/secret key pair where the security key is only known by its Bitcoin account owner. It is usually hosted on some platform and can only be spent after its owner and the platform sign on it. In this paper, we investigate how to jointly manage the Bitcoin trading when the Bitcoin account is possessed by multiple participants and how to simultaneously guarantee the anonymity of the multiple owners. We first consider the scenario where a single dealer possesses the Bitcoin account but authorizes multiple participants to jointly manage it. For instance, a company authorizes its several departments to manage its account. We next consider the scenario where the Bitcoin account is shared by some peers, e.g., joint investigators each of whom independent possesses a part of the account. The main challenge is that the signers are uncertain in different transactions. We propose partially blind threshold signatures with uncertain signers and their extensions to address this challenge. Analysis shows that our proposals are secure and efficient.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014) IEEE Secur Priv 11:443 Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014) IEEE Secur Priv 11:443
go back to reference Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014) In: Bohme R, Brenner M, Moore T, Smith M (eds) Financial cryptography and data security. Lecture notes in computer science, vol 8438. Springer, Berlin, pp 105–121. doi:10.1007/978-3-662-44774-1_8 Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014) In: Bohme R, Brenner M, Moore T, Smith M (eds) Financial cryptography and data security. Lecture notes in computer science, vol 8438. Springer, Berlin, pp 105–121. doi:10.​1007/​978-3-662-44774-1_​8
go back to reference Bentov I, Kumaresan R (2014) Advances in cryptology-CRYPTO. In: Lecture notes in computer science. In: Garay J, Gennaro R (eds) Lecture notes in computer science, vol 8617. Springer, Berlin, pp 421–439. doi:10.1007/978-3-662-44381-1_24 Bentov I, Kumaresan R (2014) Advances in cryptology-CRYPTO. In: Lecture notes in computer science. In: Garay J, Gennaro R (eds) Lecture notes in computer science, vol 8617. Springer, Berlin, pp 421–439. doi:10.​1007/​978-3-662-44381-1_​24
go back to reference Chow SS, Hui LC, Yiu S, Chow K (2005) Information security and privacy. In: Boyd C, Nieto JMG (eds) Lecture notes in computer science, vol 3574. Springer, Berlin, pp 316–328. doi:10.1007/11506157_27 Chow SS, Hui LC, Yiu S, Chow K (2005) Information security and privacy. In: Boyd C, Nieto JMG (eds) Lecture notes in computer science, vol 3574. Springer, Berlin, pp 316–328. doi:10.​1007/​11506157_​27
go back to reference Cui W, Xin Y, Yang Y, Niu X (2007) 699–702 Cui W, Xin Y, Yang Y, Niu X (2007) 699–702
go back to reference Hanatani Y, Komano Y, Ohta K, Kunihiro N (1006) Financial cryptography and data security, pp 236–250 Hanatani Y, Komano Y, Ohta K, Kunihiro N (1006) Financial cryptography and data security, pp 236–250
go back to reference Hartmut S (2005) Proceedings of the eighth IEEE international symposium on object-oriented real-time distributed computing, pp 201–203 Hartmut S (2005) Proceedings of the eighth IEEE international symposium on object-oriented real-time distributed computing, pp 201–203
go back to reference Jinho K, Kwangjo K, Chulsoo L (2002) Information security and cryptology-ICISC. In: Kwangjo K (ed) Lecture notes in computer science, vol 2288. Springer, Berlin, pp 318–327. doi:10.1007/3-540-45861-1_24 Jinho K, Kwangjo K, Chulsoo L (2002) Information security and cryptology-ICISC. In: Kwangjo K (ed) Lecture notes in computer science, vol 2288. Springer, Berlin, pp 318–327. doi:10.​1007/​3-540-45861-1_​24
go back to reference Karl DM, Dwyert JO (2014) ISSC 2014/CIICT, pp 280–285 Karl DM, Dwyert JO (2014) ISSC 2014/CIICT, pp 280–285
go back to reference Liaojun YW (2005) Pang Wuhan Univ J Nat Sci 10:191 Liaojun YW (2005) Pang Wuhan Univ J Nat Sci 10:191
go back to reference Tang S (2007) J South China Univ Technol 168–170 Tang S (2007) J South China Univ Technol 168–170
Metadata
Title
Secure joint Bitcoin trading with partially blind fuzzy signatures
Authors
Qianhong Wu
Xiuwen Zhou
Bo Qin
Jiankun Hu
Jianwei Liu
Yong Ding
Publication date
29-12-2015
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 11/2017
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-1997-6

Other articles of this Issue 11/2017

Soft Computing 11/2017 Go to the issue

Premium Partner