[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving Strategies

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14897))

Included in the following conference series:

  • 335 Accesses

Abstract

Permissioned blockchain is often used in multi-consortium applications due to its unique features such as provenance, immutability, and tamper-resistance. For these applications working in a malicious environment, privacy protection is very important. There have been many works attempting to solve the challenge of privacy protection. However, existing works suffer from problems such as low flexibility, difficulty in regulation and waste of computation resources. To address these problems, we propose FXChain, a multi-consortium permissioned blockchain system with a flexible privacy-preserving strategy. We provide a general cross-ledger transaction framework to support and help designing the strategy. In this framework, we divide the cross-ledger transaction into two steps, provide more flexibility to users. We classify privacy requirements into multiple levels from the strongest to the weakest in detail, and design a flexible privacy-preserving strategy for cross-ledger transactions, allowing users to choose proper privacy scheme according to their own demands. We conduct experiments to evaluate the overhead of each level and the overall performance of the system, helping users making better choices. The experiments also show that the impact of our privacy protection scheme is acceptable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 103.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 109.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2009). http://www.bitcoin.org/bitcoin.pdf

  2. Ethereum blockchain app platform (2017). https://www.ethereum.org

  3. Hyperledger. Private Data Collections: A High-Level Overview. https://www.hyperledger.org/blog/2018/10/23/private-data-collectionsa-high-level-overview

  4. PegaSys. [n.d.]. Scaling Consensus for Enterprise: Explaining the IBFT Algorithm. https://media.consensys.net/scaling-consensus-for-enterprise-explainingthe-ibft-lgorithm-ba86182ea668

  5. Lu, Y., Tang, Q., Wang, G.: Zebralancer: private and anonymous crowdsourcing system atop open blockchain. In: International Conference on Distributed Computing Systems (ICDCS), 853–865. IEEE (2018)

    Google Scholar 

  6. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pp. 291–304 (1985)

    Google Scholar 

  7. Ben-Sasson, E., Chiesa, A., Tromer, E., Virza, M.: Succinct non-interactive zero knowledge for a von Neumann architecture. In: Proceedings of the 23rd USENIX Security Symposium, pp. 781–796 (2014)

    Google Scholar 

  8. Chaum, D., Van Heyst, E.: Group signatures. In: Proceedings of the Workshop on the Theory and Application of Cryptograph Techniques, pp. 257–265 (1991)

    Google Scholar 

  9. Paillier, Pascal: Public-Key cryptosystems based on composite degree residuosity classes. In: Stern, Jacques (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  10. Sasson, E.B.: Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 459–474 (2014)

    Google Scholar 

  11. Bünz, Benedikt, Agrawal, Shashank, Zamani, Mahdi, Boneh, Dan: Zether: towards privacy in a smart contract world. In: Bonneau, Joseph, Heninger, Nadia (eds.) FC 2020. LNCS, vol. 12059, pp. 423–443. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_23

    Chapter  Google Scholar 

  12. Amiri, M.J., Loo, B.T., Agrawal, D., Abbadi, A.E.: Qanaat: a scalable multi-enterprise permissioned blockchain system with confidentiality guarantees. In: Proceedings of the VLDB Endowment vol. 15, 2839–2852 (2022)

    Google Scholar 

  13. Rondelet, A., Zajac, M.: Zeth: on integrating zerocash on ethereum. (2019). arXiv:1904.00905

  14. Androulaki, E., et al.: Hyperledger Fabric: a distributed operating system for permissioned blockchains. In European Conference on Computer Systems (EuroSys 2018), ACM, 30 (2018)

    Google Scholar 

  15. Gorenflo, C., Golab, L., Keshav, S.: XOX fabric: a hybrid approach to transaction execution. In International Conference on Blockchain and Cryptocurrency (ICBC), 1–9. IEEE, 2020

    Google Scholar 

  16. Amiri M.J., Agrawal D., El Abbadi A.: Permissioned blockchains: properties, techniques and applications. In: Proceedings of the 2021 International Conference on Management of Data, Association for Computing Machinery, New York, NY, USA (2021), pp. 2813-2820

    Google Scholar 

  17. Zhu, S., Cai, Z., Hu, H., Li, Y., Li, W.: zkCrowd: a hybrid blockchain-based crowdsourcing platform. Trans. Ind. Inf. 16(6), 4196–4205 (2019)

    Google Scholar 

  18. Li , Y., Et al.: Toward privacy and regulation in blockchain-based cryptocurrencies. IEEE Netw. 33(5), 111–117 (2019)

    Google Scholar 

  19. Liu, W., Wan, Z., Shao, J., Yu, Y.: HyperMaze: towards privacy-preserving and scalable permissioned blockchain. IEEE Trans. Dependable Secure. Comput. 20(1), 360–376 (2023)

    Article  Google Scholar 

  20. Corrigan-Gibbs, H., Boneh, D.: Prio: private, robust, and scalable computation of aggregate statistics. In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2017), pp. 259–282 (2017)

    Google Scholar 

  21. Amiri, M.J., Duguépéroux, J., Allard, T., Agrawal, D., El Abbadi, A.: Separ: towards regulating future of work multi-platform crowdworking environments with privacy guarantees. In: Proceedings of the Web Conference (WWW 2021), pp. 1891–1903 (2021)

    Google Scholar 

  22. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: International Conference on Open and Big Data (OBD), pp. 25–30. IEEE, 2016

    Google Scholar 

  23. Korpela, K., Hallikas, J., Dahlberg, T.: Digital supply chain transformation toward blockchain integration. In: Hawaii International Conference on system sciences (HICSS) (2017)

    Google Scholar 

  24. Zhang, R., Xue, R., Liu, L.: Security and privacy for healthcare blockchains. IEEE Trans. Serv. Comput. 15(6), 3668–3686 (2021)

    Article  Google Scholar 

  25. JP Morgan Chase. Quorum white paper (2016)

    Google Scholar 

  26. Huang, J., Tang, Q., Su, C., Ruan, N.: Secure collaboration between consortiums in permissioned blockchains. In: The 16th International Conference on Provable and Practical Security (ProvSec), pp. 228–245 (2022)

    Google Scholar 

  27. Ongaro, D., Ousterhout, J.K.: In search of an understandable consensus algorithm. In: Annual Technical Conference (ATC). USENIX Association, pp. 305–319 (2014)

    Google Scholar 

  28. Sharma, A., Schuhknecht, F.M., Agrawal, D., Dittrich, J.: Blurring the lines between blockchains and database systems: the case of hyperledger fabric. In: SIGMOD International Conference on Management of Data, ACM, pp.105–122 (2019)

    Google Scholar 

  29. Androulaki, Elli, Cachin, Christian, De Caro, Angelo, Kokoris-Kogias, Eleftherios: Channels: horizontal scaling and confidentiality on permissioned blockchains. In: Lopez, Javier, Zhou, Jianying, Soriano, Miguel (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 111–131. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99073-6_6

    Chapter  Google Scholar 

  30. Gorenflo, C., Lee, S., Golab, L., Keshav, S.: Fastfabric: scaling hyperledger fabric to 20,000 transactions per second. In: International Conference on Blockchain and Cryptocurrency (ICBC), pp. 455–463. IEEE, 2019

    Google Scholar 

  31. Ruan, P., Loghin, D., Ta, Q.T., Zhang, M., Chen, G., Ooi, B.C.: A transactional perspective on execute-order-validate blockchains. In SIGMOD International Conference on Management of Data, ACM, pp. 543–557 (2020)

    Google Scholar 

  32. Amiri, M.J., Agrawal, D., Abbadi, A.E.: Caper: a cross-application permissioned blockchain. Proc. VLDB Endowment 12, 11, 1385–1398 (2019)

    Google Scholar 

  33. Feng, Hanwen, Tang, Qiang: Witness authenticating NIZKs and applications. In: Malkin, Tal, Peikert, Chris (eds.) CRYPTO 2021. LNCS, vol. 12828, pp. 3–33. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84259-8_1

    Chapter  Google Scholar 

  34. Lu, y., Tang, Q., Wang, G.: Dragoon: private decentralized hits made practical. In: 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 910–920 (2020) https://doi.org/10.1109/ICDCS47774.2020.00084

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Na Ruan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lou, Z., Ruan, N., Cai, Y. (2024). FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving Strategies. In: Zhu, T., Li, Y. (eds) Information Security and Privacy. ACISP 2024. Lecture Notes in Computer Science, vol 14897. Springer, Singapore. https://doi.org/10.1007/978-981-97-5101-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-5101-3_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-5100-6

  • Online ISBN: 978-981-97-5101-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics