Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 35, Issue 3 (2024)
  4. Confidential Transaction Balance Verific ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • More
    Article info Full article Related articles

Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs
Volume 35, Issue 3 (2024), pp. 601–616
Aušrys Kilčiauskas   Antanas Bendoraitis   Eligijus Sakalauskas  

Authors

 
Placeholder
https://doi.org/10.15388/24-INFOR564
Pub. online: 19 August 2024      Type: Research Article      Open accessOpen Access

Received
1 March 2024
Accepted
1 June 2024
Published
19 August 2024

Abstract

One of the main trends for the monitoring and control of business processes is to implement these processes via private blockchain systems. These systems must ensure data privacy and verifiability for the entire network here denoted by ‘Net’. In addition, every business activity should be declared to a trusted third party (TTP), such as an Audit Authority (AA), for tax declaration and collection purposes.
We present a solution for a confidential and verifiable realization of transactions based on the Unspent Transaction Output (UTxO) paradigm. This means that the total sum of transaction inputs (incomes) $In$ must be equal to the total sum of transaction outputs (expenses) $Ex$, satisfying the balance equation $In=Ex$. Privacy in a private blockchain must be achieved through the encryption of actual transaction values. However, it is crucial that all participants in the network be able to verify the validity of the transaction balance equation. This poses a challenge with probabilistically encrypted data. Moreover, the inputs and outputs are encrypted with different public keys. With the introduction of the AA, the number of different public keys for encryption can be reduced to two. Incomes are encrypted with the Receiver’s public key and expenses with the AA’s public key.
The novelty of our realization lies in taking additively-multiplicative, homomorphic ElGamal encryption and integrating it with a proposed paradigm of modified Schnorr identification providing a non-interactive zero-knowledge proof (NIZKP) using a cryptographically secure h-function. Introducing the AA as a structural element in a blockchain system based on the UTxO enables effective verification of encrypted transaction data for the Net. This is possible because the proposed NIZKP is able to prove the equivalency of two ciphertexts encrypted with two different public keys and different actors.
This integration allows all users on the Net to check the UTxO-based transaction balance equation on encrypted data. The security considerations of the proposed solution are presented.

References

 
Boakye, E.A., Zhao, H., Ahia, H. (2022). Emerging research on blockchain technology in finance; a conveyed evidence of bibliometric-based evaluations. The Journal of High Technology Management Research, 33(2), 100437. https://doi.org/10.1016/j.hitech.2022.100437. https://www.sciencedirect.com/science/article/pii/S1047831022000128.
 
Boneh, D., Shoup, V. (2023). A Graduate Course in Applied Cryptography. Draft 0.6. URL: A Graduate Course in Applied Cryptography (stanford.edu).
 
Bunz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G. (2018). Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE, pp. 315–334.
 
Blazy, O., Bultel, X., Lafourcade, P., Kempner, O.P. (2021). Generic Plaintext Equality and Inequality Proofs (Extended Version). Cryptology ePrint Archive. https://eprint.iacr.org/2021/426.pdf.
 
Canard, S., Fuchsbauer, G., Gouget, A., Laguillaumie, F. (2012). Plaintext-checkable encryption. In: Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings. Springer, Berlin Heidelberg, pp. 332–348. https://inria.hal.science/docs/00/76/83/05/PDF/PCE_RSA.pdf.
 
Dong, S., Zhao, Z., Wang, B., Gao, W., Zhang, S. (2023). Certificateless encryption supporting multi-ciphertext equality test with proxy-assisted authorization. The Journal of High Technology Management Research, 12(20), 4326. https://www.mdpi.com/2079-9292/12/20/4326.
 
ElGamal T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. The Journal of High Technology Management Research, 31(4), 469–472. https://doi.org/10.1109/TIT.1985.1057074.
 
Freeman, D.M. (2011). Schnorr Identification and Signatures. http://web.stanford.edu/class/cs259c/lectures/schnorr.pdf.
 
Guomin, Y., Chik, T.H., Qiong, H., Duncan, W.S. (2010). Probabilistic public key encryption with equality test. In: Topics in Cryptology: Cryptographers’ Track at the RSA Conference, CT-RSA 2010, San Francisco, March 1–5: Proceedings, Lecture Notes in Computer Science, Vol. 5985, pp. 119–131. https://ink.library.smu.edu.sg/sis_research/7419.
 
Hongbo, L., Huang, Q., Ma, S., Shen, J., Susilo, W. (2019). Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access, 7, 25409–25421. https://doi.org/10.1109/TIT.1985.1057074.
 
Muleravičius, J., Timofejeva, I., Mihalkovich, A., Sakalauskas, E. (2019). Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access, 30(2), 327–348. https://doi.org/10.15388/Informatica.2019.208.
 
Pinna, A., Tonelli, R., Orrú, M., Marchesi, M. (2018). A petri nets model for blockchain analysis. The Computer Journal, 61(9), 1374–1388. https://doi.org/10.1093/comjnl/bxy001.
 
Sakalauskas, E., Muleravičius, J., Timofejeva, I., (2017). Computational resources for mobile E-wallet system with observers. In: 2017 Electronics. IEEE, pp. 1–5. https://doi.org/10.1109/ELECTRONICS.2017.7995226.
 
Sakalauskas, E., Timofejeva, I., Michalkovič, A., Muleravičius, J. (2018). A simple off-line E-cash system with observers. Information Technology and Control, 47(1), 107–117. http://itc.ktu.lt/index.php/ITC/article/view/18021/9326.
 
Sakalauskas, E., Bendoraitis, A., Lukšaitė, D., Butkus, G., Vitkutė-Adžgauskienė, D. (2023). A petri nets model for blockchain analysis. Informatica, 34(4), 603–616. https://content.iospress.com/articles/informatica/infor531.
 
Zhao, M., Ding, Y., Tang, S., Liang, H., Wang, H. (2022). Public key encryption with authorized equality test on outsourced ciphertexts for cloud-assisted IoT in dual server model. Wireless Communications and Mobile Computing, 2022, 1–10. https://www.hindawi.com/journals/wcmc/2022/4462134/.

Biographies

Kilčiauskas Aušrys
ausrys.kilciauskas@ktu.lt

A. Kilčiauskas is a PhD student of natural sciences’ informatics at the Department of Applied Mathematics. His research area is anonymity, confidentiality, and verifiability functionalities implementation in private blockchain transactions.

Bendoraitis Antanas
antanas.bendoraitis@ktu.edu

A. Bendoraitis is a PhD student at the Faculty of Informatics. He has finished a three-semester competence course in cryptography and blockchain systems at the Department of Applied Mathematics.

Sakalauskas Eligijus
eligijus.sakalauskas@ktu.lt

E. Sakalauskas is a professor at the Department of Applied Mathematics, Kaunas University of Technology. He is the head of the Cryptography and Blockchain Systems research group. The scope of his scientific interests is the creation of new cryptographic methods including post-quantum methods and their security analysis. Other area of activity is cryptographic method application to private blockchain technologies, additional functionality and trustworthiness.


Full article Related articles PDF XML
Full article Related articles PDF XML

Copyright
© 2024 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
blockchain transactions unspent transaction output confidentiality verifiability

Metrics
since January 2020
306

Article info
views

78

Full article
views

110

PDF
downloads

40

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy