Linkable group signatures against malicious regulators for regulated privacy-preserving cryptocurrencies

Xiao Wang , Yanqi Zhao , Lingyue Zhang , Min Xie , Yong Yu , Huilin Li

High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (4) : 100318

PDF
High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (4) :100318 DOI: 10.1016/j.hcc.2025.100318
Research Articles
research-article

Linkable group signatures against malicious regulators for regulated privacy-preserving cryptocurrencies

Author information +
History +
PDF

Abstract

With the emergence of illegal behaviors such as money laundering and extortion, the regulation of privacy-preserving cryptocurrency has become increasingly important. However, existing regulated privacy-preserving cryptocurrencies usually rely on a single regulator, which seriously threatens users’ privacy once the regulator is corrupt. To address this issue, we propose a linkable group signature against malicious regulators (ALGS) for regulated privacy-preserving cryptocurrencies. Specifically, a set of regulators work together to regulate users’ behavior during cryptocurrencies transactions. Even if a certain number of regulators are corrupted, our scheme still ensures the identity security of a legal user. Meanwhile, our scheme can prevent double-spending during cryptocurrency transactions. We first propose the model of ALGS and define its security properties. Then, we present a concrete construction of ALGS, which provides CCA-2 anonymity, traceability, non-frameability, and linkability. We finally evaluate our ALGS scheme and report its advantages by comparing other schemes. The implementation result shows that the runtime of our signature algorithm is reduced by 17% compared to Emura et al. (2017) and 49% compared to KSS19 (Krenn et al. 2019), while the verification time is reduced by 31% compared to Emura et al. and 47% compared to KSS19.

Keywords

Privacy protection / Blockchain / Linkable group signatures / Against malicious regulator

Cite this article

Download citation ▾
Xiao Wang, Yanqi Zhao, Lingyue Zhang, Min Xie, Yong Yu, Huilin Li. Linkable group signatures against malicious regulators for regulated privacy-preserving cryptocurrencies. High-Confidence Computing, 2025, 5(4): 100318 DOI:10.1016/j.hcc.2025.100318

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Xiao Wang: Writing - original draft. Yanqi Zhao: Writing - original draft, Formal analysis. Lingyue Zhang: Writing - original draft. Min Xie: Writing - original draft. Yong Yu: Writing - review & editing. Huilin Li: Writing - review & editing.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgments

This work is supported by the National Key R&D Program of China (2022YFB2701500), the National Natural Science Foundation of China (62272385, 62202375), Shaanxi Distinguished Youth Project (2022JC-47), the Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Research (ZR2022ZD03), the Key Research and Development Program of Shaanxi (2024GX-ZDCYL-01-09, 2024GX-ZDCYL-01-15), Young Talent Fund of Association for Science and Technology in Shaanxi, China (20220134), The Youth Innovation Team of Shaanxi Universities (24JP180).

References

[1]

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

[2]

V. Buterin, et al., A next-generation smart contract and decentralized application platform, White Pap. 3 (37) (2014) 1-2.

[3]

E.B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, M. Virza, Zerocash: Decentralized anonymous payments from bitcoin, in: 2014 IEEE Symposium on Security and Privacy, IEEE, 2014, pp. 459-474.

[4]

J. Tian, Y. Zhao, X. Yang, X. Zhao, R. Chen, Y. Yu, Identity-based thresh-old (multi) signature with private accountability for privacy-preserving blockchain, High-Confid. Comput. (2024) 100271.

[5]

Q. Ma, Y. Zhao, X. Liu, X. Yang, M. Xie, Y. Yu, Redactable blockchain from accountable weight threshold chameleon hash, High-Confid. Comput. (2024) 100281.

[6]

S. Devidas, S. Rao YV, N.R. Rekha, A decentralized group signature scheme for privacy protection in a blockchain, Int. J. Appl. Math. Comput. Sci 31 (2) (2021).

[7]

Q. Yu, S. Liao, L. Wang, Y. Yu, L. Zhang, Y. Zhao, A regulated anonymous cryptocurrency with batch linkability, Comput. Stand. Interfaces 87 (2024) 103770.

[8]

I. Damgård, C. Ganesh, H. Khoshakhlagh, C. Orlandi, L. Siniscalchi, Balancing privacy and accountability in blockchain identity management, in: Cryptographers’ Track At the RSA Conference, Springer, 2021, pp. 552-576.

[9]

D. Chaum, E. Van Heyst, Group signatures, in: Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8-11, 1991 Proceedings 10, Springer, 1991, pp. 257-265.

[10]

M. Bellare, H. Shi, C. Zhang, Foundations of group signatures: The case of dynamic groups, in: Cryptographers’ Track At the RSA Conference, Springer, 2005, pp. 136-153.

[11]

F. Reid, M. Harrigan, An analysis of anonymity in the bitcoin system, Springer, 2013.

[12]

A. Biryukov, D. Khovratovich, I. Pustogarov, Deanonymisation of clients in bitcoin P2P network, in:Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014, pp. 15-29.

[13]

A. Kumar, C. Fischer, S. Tople, P. Saxena,A traceability analysis of monero’s blockchain, in: Computer Security-ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II 22, Springer, 2017, pp. 153-173.

[14]

L. Zhang, H. Li, Y. Li, Y. Yu, M.H. Au, B. Wang, An efficient linkable group signature for payer tracing in anonymous cryptocurrencies, Future Gener. Comput. Syst. 101 (2019) 29-38.

[15]

L. Garms, A. Lehmann,Group signatures with selective linkability, in: Public-Key Cryptography-PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I 22, Springer, 2019, pp. 190-220.

[16]

H. Anada, M. Fukumitsu, S. Hasegawa, Group signatures with designated traceability over openers’ attributes, Int. J. Netw. Comput. 12 (2) (2022) 493-508.

[17]

A. Shamir, How to share a secret, Commun. ACM 22 (11) (1979) 612-613.

[18]

S. Goldwasser, S. Micali, C. Rackoff, The knowledge complexity of interactive proof-systems, in:Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, 1985, pp. 291-304.

[19]

W. Diffie, M.E. Hellman, New directions in cryptography, in: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022, pp. 365-390.

[20]

R. Gennaro, S. Goldfeder, B. Ithurburn, Fully distributed group signatures, See Orbs. Com/ White-Papers/ Fully-Distributed-Group-Signatures/Website (2019).

[21]

Y.-F. Lai, S. Dobson, Collusion resistant revocable ring signatures and group signatures from hard homogeneous spaces, Cryptol. EPrint Arch. (2021).

[22]

F. Tang, Z. Feng, Q. Gong, Y. Huang, D. Huang, Privacy-preserving scheme in the blockchain based on group signature with multiple managers, Secur. Commun. Networks 2021 (2021) 1-8.

[23]

J. Camenisch, M. Drijvers, A. Lehmann, G. Neven, P. Towa, Short threshold dynamic group signatures, in: International Conference on Security and Cryptography for Networks, Springer, 2020, pp. 401-423.

[24]

H.-j. Song, T. Kim, Y.-W. Hwang, D. Seo, I.-Y. Lee, A study on dynamic group signature scheme with threshold traceability for blockchain, High-Confid. Comput. 4 (2) (2024) 100163.

[25]

R. Cramer, V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, in: Advances in Cryptology— CRYPTO’98: 18th Annual International Cryptology Conference Santa Bar-bara, California, USA August 23-27, 1998 Proceedings 18, Springer, 1998, pp. 13-25.

[26]

K. Emura, T. Hayashi, A. Ishida, Group signatures with time-bound keys revisited: a new model, an efficient construction, and its implementation, IEEE Trans. Dependable Secur. Comput. 17 (2) (2017) 292-305.

[27]

B. Libert, F. Mouhartem, T. Peters, M. Yung, Practical" signatures with efficient protocols" from simple assumptions, in:Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016, pp. 511-522.

[28]

S. Krenn, K. Samelin, C. Striecks, Practical group-signatures with privacy-friendly openings, in:Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019, pp. 1-10.

[29]

S.D. Galbraith, K.G. Paterson, N.P. Smart, Pairings for cryptographers, Discrete Appl. Math. 156 (16) (2008) 3113-3121.

[30]

D. Boneh, X. Boyen, Short signatures without random oracles, in: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2004, pp. 56-73.

[31]

G. Fuchsbauer, D. Pointcheval, D. Vergnaud, Transferable constant-size fair e-cash, in: International Conference on Cryptology and Network Security, Springer, 2009, pp. 226-247.

[32]

M.H. Au, W. Susilo, Y. Mu, Constant-size dynamic k-TAA, in:Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings 5, Springer, 2006, pp. 111-125.

[33]

J. Camenisch, M. Drijvers, A. Lehmann, Anonymous attestation using the strong diffie hellman assumption revisited, in:Trust and Trustworthy Computing: 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings 9, Springer, 2016, pp. 1-20.

[34]

D. Boneh, X. Boyen, H. Shacham, Short group signatures, in: Annual International Cryptology Conference, Springer, 2004, pp. 41-55.

[35]

S. Tessaro, C. Zhu, Revisiting BBS signatures, in: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2023, pp. 691-721.

[36]

J. Camenisch, M. Stadler, Efficient group signature schemes for large groups, in: Annual International Cryptology Conference, Springer, 1997, pp. 410-424.

[37]

M. Chase, A. Lysyanskaya, On signatures of knowledge, in: Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006. Proceedings 26, Springer, 2006, pp. 78-96.

[38]

A. Bagherzandi, J.-H. Cheon, S. Jarecki, Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma, in:Proceedings of the 15th ACM Conference on Computer and Communications Security, 2008, pp. 449-458.

PDF

94

Accesses

0

Citation

Detail

Sections
Recommended

/