A Privacy-Preserving Enforced Bill Collection System using Smart Contracts

被引:4
|
作者
Fujitani, Tomoki [1 ]
Emura, Keita [2 ]
Omote, Kazumasa [1 ]
机构
[1] Univ Tsukuba, Natl Inst Informat & Commun Technol, Tsukuba, Ibaraki, Japan
[2] Natl Inst Informat & Commun Technol, Tsukuba, Ibaraki, Japan
关键词
REVOCABLE GROUP SIGNATURE; SCHEME;
D O I
10.1109/AsiaJCIS53848.2021.00018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Maintaining a balance between anonymity and traceability is a fundamental issue in privacy-preserving systems. Isshiki et al. proposed an identity management system based on group signatures in which a service provider anonymously determines whether or not users of the service are legitimate members, and only a bill collector can identify users for the purposes of sending them invoices. It is particularly worth noting that, under the Isshiki system, the service provider is not required to manage personal information such as user lists, which allows the system to outperform other in terms of preserving user privacy and managing personal information leakage risk. It is also noteworthy that the Isshiki system only considers cases in which the bill collector identifies users who have used the service and that, in fact, identified users who ignore invoices can use the service for free. In this paper, we extended the Isshiki system by adding a smart contract-enabled enforcement bill collection functionality. Under this functionality, deposits made by users who do not pay a service fee are automatically transferred to the bill collector. Because of their centralized structure, group signatures are not suitable to blockchain systems, therefore, the proposed system employs accountable ring signatures as building blocks. The privacy-preserving enforced bill collection system is implemented using the accountable ring signature scheme developed by Bootle et al. and Ethereum smart contracts. To reduce the gas costs associated with running smart contracts, the smart contract is not run unless the user ignores an invoice, and basic procedures are run via an off-chain channel. To avoid the use of heavy cryptographic algorithms in carrying out the accountable ring signature scheme for running smart contracts, we employed standard elliptic curve digital signature algorithm (ECDSA) signatures without especially changing the state to be verified in smart contracts.
引用
收藏
页码:51 / 60
页数:10
相关论文
共 50 条
  • [1] Privacy-preserving credential smart contracts using Zokrates
    Kim, Geunyoung
    Ham, Yunsik
    Ryou, Jaecheol
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (08): : 2417 - 2430
  • [2] DecentID: Decentralized and Privacy-preserving Identity Storage System using Smart Contracts
    Friebe, Sebastian
    Sobik, Ingo
    Zitterbart, Martina
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 37 - 42
  • [3] Smart Contracts for a Secure and Privacy-Preserving Smart Grid
    Ferre-Queralt, Joan
    Castella-Roca, Jordi
    Viejo, Alexandre
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 103 - 118
  • [4] Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions
    Perez, Alfredo J.
    Zeadally, Sherali
    [J]. COMPUTER SCIENCE REVIEW, 2022, 43
  • [5] Privacy-Preserving Online Parking Based on Smart Contracts
    Dzurenda, Petr
    Angles-Tafalla, Carles
    Ricci, Sara
    Malina, Lukas
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [6] A Privacy-Preserving Data Feed Scheme for Smart Contracts
    Wang, Hao
    Liu, Zhe
    Ge, Chunpeng
    Sakurai, Kouichi
    Su, Chunhua
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) : 195 - 204
  • [7] Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts
    Patil, Akash Suresh
    Hamza, Rafik
    Hassan, Alzubair
    Jiang, Nan
    Yan, Hongyang
    Li, Jin
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [8] PPCA: Privacy-Preserving Conditional Actions for IoT Environments Using Smart Contracts
    Le, Tam
    Mutka, Matt W.
    [J]. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 172 - 179
  • [9] Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
    Kosba, Ahmed
    Miller, Andrew
    Shi, Elaine
    Wen, Zikai
    Papamanthou, Charalampos
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 839 - 858
  • [10] Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements
    Deebak, B. D.
    AL-Turjman, Fadi
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58