1. An Anonymous Trust-Marking Scheme on Blockchain Systems
- Author
-
Tomoki Fujitani, Teppei Sato, Keita Emura, and Kazumasa Omote
- Subjects
FOS: Computer and information sciences ,Scheme (programming language) ,Cryptocurrency ,Computer Science - Cryptography and Security ,Blockchain ,General Computer Science ,Computer science ,Cryptography ,Computer security ,computer.software_genre ,Security token ,Ethereum ,Ring signature ,General Materials Science ,Elliptic curve cryptography ,computer.programming_language ,cryptography ,business.industry ,General Engineering ,NEM ,accountable ring signature ,TK1-9971 ,Trustworthiness ,Curve25519 ,Electrical engineering. Electronics. Nuclear engineering ,business ,Cryptography and Security (cs.CR) ,computer ,Bitcoin - Abstract
During the Coincheck incident, which recorded the largest damages in cryptocurrency history in 2018, it was demonstrated that using Mosaic token can have a certain effect. Although it seems attractive to employ tokens as countermeasures for cryptocurrency leakage, Mosaic is a specific token for the New Economy Movement (NEM) cryptocurrency and is not employed for other blockchain systems or cryptocurrencies. Moreover, although some volunteers tracked leaked NEM using Mosaic in the CoinCheck incident, it would be better to verify that the volunteers can be trusted. Simultaneously, if someone (e.g., who stole cryptocurrencies) can identify the volunteers, then that person or organization may be targets of them. In this paper, we propose an anonymous trust-marking scheme on blockchain systems that is universally applicable to any cryptocurrency. In our scheme, entities called token admitters are allowed to generate tokens adding trustworthiness or untrustworthiness to addresses. Anyone can anonymously verify whether these tokens were issued by a token admitter. Simultaneously, only the designated auditor and no one else, including nondesignated auditors, can identify the token admitters. Our scheme is based on accountable ring signatures and commitment, and is implemented on an elliptic curve called Curve25519, and we confirm that both cryptographic tools are efficient. Moreover, we also confirm that our scheme is applicable to Bitcoin, Ethereum, and NEM., An extended abstract appeared at the 3rd IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021. This is the full version
- Published
- 2021