Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies
نویسندگان
چکیده
Confidential Transactions (CT) hide coin amounts even from verifiers without the help of trusted third parties. Aggregable CTs are a scalable category with “spent record trimming”. For example, if Alice sends coins to Bob, who had sent similar Charles, aggregated transaction shows only that Charles by deleting Bob’s records. Since number spent records grows linearly transactions, faster than accounts, cash systems based on aggregable highly scalable. However, existing quantum-safe CT protocols have large unspent records, and efficient vulnerable quantum attacks. We introduce two protocols, new homomorphic zero-knowledge proofs, either plain or Module Short Integer Solution (SIS MSIS) problems, both believed be secure against adversaries. further implement MSIS-based protocol as C library. Our experiments 10 4 transactions show aggregation reduces system’s size 40%–54% when output/input rate is in range 1/1–2/1. system 1.73 GB can reduced 0.98 1.5, which has been historical real-world average rate.
منابع مشابه
Bulletproofs: Efficient Range Proofs for Confidential Transactions
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup; the proof size is only logarithmic in the witness size. Bulletproofs are especially well suited for efficient range proofs on committed values: they enable proving that a committed value is in a range using only 2 log2pnq ` 9 group and field elements, where n is the b...
متن کاملCompact Confidential Transactions for Bitcoin
An enhancement is suggested to make Bitcoin transaction amounts hidden to all but the sender and receiver. In each transaction, the output amounts are encrypted with the public keys of the respective receivers. Only the transaction fee is publicly revealed, to allow miners to prioritise transactions. A homomorphic commitment for each transaction proves that the sum of the transaction inputs mat...
متن کاملRing Confidential Transactions
This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is cryptocurrency which is distributed through a proof of work “mining” process. The original Monero protocol was based on CryptoNote, which uses Ring Signatures and one-time keys to hide the destination and origin of transactions. Recently the...
متن کاملBlockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions
The “blockchain” distributed ledger pioneered by Bitcoin is effective at preventing double-spending, but inherently attracts (1) “user cartels” and (2) incompressible delays, as a result of linear verification and a winner-takes-all incentive lottery. We propose to forgo the “blocks” and “chain” entirely, and build a truly distributed ledger system based on a lean graph of cross-verifying trans...
متن کاملParalysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More
Suppose that N players share cryptocurrency using an M out-of-N multisig scheme. If N−M+1 players disappear, the remaining ones have a problem: They’ve permanently lost their funds. We introduce Paralysis Proofs. A Paralysis Proof is a proof that players cannot act in concert, e.g., some players have become unavailable. Paralysis Proofs can support the construction of a Paralysis Proof System, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3149605