TheCoin: Privacy and security considerations within blockchain transactions

Mohamed Ikbal Nacer, S. Prakoonwit, E. Prakash
{"title":"TheCoin: Privacy and security considerations within blockchain transactions","authors":"Mohamed Ikbal Nacer, S. Prakoonwit, E. Prakash","doi":"10.1145/3456126.3456127","DOIUrl":null,"url":null,"abstract":"TheChain is a solution to many problems such as monopoly, heavy state transition, and security vulnerabilities. TheChain solves these problems by introducing the intersection of regions as an incentive before allowing validators to nest a client directory. Intersecting their operating territories forces them to keep a watch over each other. The definition of privacy can take many forms, starting from the right to be forgotten beside being away from public attention. Although the pseudonymity of the user within the network can enhance the user's privacy, several pieces of research have studied the techniques to take advantage of the network structure to identify the users of pseudonyms. Moreover, two models have been used to record the updated exchange of values within the blockchain system, which are the unspent transaction output (UTXO) and the balance model. The UTXO suffers from duplication of information and the balance model suffers from having a single point of entry. This paper introduces TheCoin model that defines the protocol of the exchange of valuable datum within TheChain system. The solution has introduced a novel approach of initiating the transaction from the receiver side by taking advantage of mobile agents empowering a topology hiding to the network. Billing within the platform has been introduced to allow advanced contractual logic to be adopted into the system on the information level. Moreover, traceable fuzziness has been used to eliminate duplication. The paper presents an evaluation of the TheCoin model in terms of system security, block size, and search performance.","PeriodicalId":431685,"journal":{"name":"2021 2nd Asia Service Sciences and Software Engineering Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Asia Service Sciences and Software Engineering Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3456126.3456127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

TheChain is a solution to many problems such as monopoly, heavy state transition, and security vulnerabilities. TheChain solves these problems by introducing the intersection of regions as an incentive before allowing validators to nest a client directory. Intersecting their operating territories forces them to keep a watch over each other. The definition of privacy can take many forms, starting from the right to be forgotten beside being away from public attention. Although the pseudonymity of the user within the network can enhance the user's privacy, several pieces of research have studied the techniques to take advantage of the network structure to identify the users of pseudonyms. Moreover, two models have been used to record the updated exchange of values within the blockchain system, which are the unspent transaction output (UTXO) and the balance model. The UTXO suffers from duplication of information and the balance model suffers from having a single point of entry. This paper introduces TheCoin model that defines the protocol of the exchange of valuable datum within TheChain system. The solution has introduced a novel approach of initiating the transaction from the receiver side by taking advantage of mobile agents empowering a topology hiding to the network. Billing within the platform has been introduced to allow advanced contractual logic to be adopted into the system on the information level. Moreover, traceable fuzziness has been used to eliminate duplication. The paper presents an evaluation of the TheCoin model in terms of system security, block size, and search performance.
the ecoin:区块链交易中的隐私和安全考虑
区块链是解决垄断、重状态转移和安全漏洞等许多问题的解决方案。在允许验证器嵌套客户端目录之前,chain通过引入区域交叉点作为激励来解决这些问题。它们的活动区域交叉迫使它们互相监视。隐私的定义可以有多种形式,从远离公众关注的权利开始。虽然用户在网络中的假名可以增强用户的隐私性,但一些研究已经研究了利用网络结构来识别假名用户的技术。此外,还使用了两个模型来记录区块链系统内更新的值交换,它们是未使用的事务输出(UTXO)和余额模型。UTXO存在信息重复的问题,平衡模型存在单一入口点的问题。本文介绍了ecoin模型,该模型定义了在chain系统内交换有价值数据的协议。该解决方案引入了一种新颖的方法,通过利用赋予网络拓扑隐藏功能的移动代理,从接收方启动事务。引入了平台内的计费功能,以便在信息级别上将高级合同逻辑引入系统。此外,还利用可跟踪模糊来消除重复。本文从系统安全性、块大小和搜索性能方面对theecoin模型进行了评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信