About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Applied Cryptography in Computer and Communications. First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings

Research Article

An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-80851-8_2,
        author={Yitao Chen and Qi Feng and Min Luo and Li Li and Debiao He},
        title={An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin},
        proceedings={Applied Cryptography in Computer and Communications. First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings},
        proceedings_a={AC3},
        year={2021},
        month={7},
        keywords={Unlinkable blind signature Privacy preservation Bitcoin Proxy blind signature Identity-based cryptography},
        doi={10.1007/978-3-030-80851-8_2}
    }
    
  • Yitao Chen
    Qi Feng
    Min Luo
    Li Li
    Debiao He
    Year: 2021
    An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin
    AC3
    Springer
    DOI: 10.1007/978-3-030-80851-8_2
Yitao Chen1, Qi Feng2, Min Luo2, Li Li2, Debiao He2
  • 1: Wuhan Maritime Communication Research Institute
  • 2: School of Cyber Science and Engineering, Wuhan University

Abstract

The privacy preservation in Bitcoin is increasingly important, partly due to its huge market capitalization and potential applications in distributed architectures. To protect the privacy of users in Bitcoin, a number of mechanisms have been proposed, where mixing service is a simple and frequently-used mechanism. The work, named Blindcoin, believes that anunlinkableblind signature scheme can help to guarantee the anonymity of users at the mixer side. Recently, Sarde and Banerjee presented an identity-based blind signature scheme. However, we found their scheme is vulnerable to a linkability attack. In this paper, we improve their scheme on this weakness and construct twounlinkableidentity-based blind signature schemes, where one is in the standard setting and the other is in the proxy setting. Our approaches delinearize the two blinding factors so that malicious signer or proxy signer cannot find any helpful information from what she knows. The security, including unlinkability, of our schemes relies on the computational Diffie-Hellman assumption in the random oracle model as analyzed in this paper. We typically show that this is of great important to hide the relationship between message-signature pairs for the privacy-protecting in Bitcoin.

Keywords
Unlinkable blind signature Privacy preservation Bitcoin Proxy blind signature Identity-based cryptography
Published
2021-07-05
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-80851-8_2
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL