IET BlockchainPub Date : 2025-01-24DOI: 10.1049/blc2.12089
Siyu Chen, Renhong Diao, Jiali Xu
{"title":"Design and implementation of solvency proof system based on zero knowledge proofs","authors":"Siyu Chen, Renhong Diao, Jiali Xu","doi":"10.1049/blc2.12089","DOIUrl":"https://doi.org/10.1049/blc2.12089","url":null,"abstract":"<p>The aim of this study is to design and implement a system that allows centralized blockchain institutions to prove their solvency. This system ensures that institutions do not misappropriate user assets and enhances trust between users and institutions. The article introduces the Groth-16 zero-knowledge proof algorithm from ZK-SNARK (zero-knowledge succinct non-interactive argument of knowledge). The R1CS arithmetic circuit in the Groth-16 algorithm effectively guarantees the authenticity and tamper-resistance of the system's raw data sources. Additionally, it combines the use of Merkle Sum Trees and Sparse Merkle trees. The former enables users to perform distributed verification of solvency proofs, while the latter effectively hides the overall number of users. Finally, users verify the balances and the private key signatures of addresses in the institution's bulletin board. Together, these components form a comprehensive and distributed solvency proof solution. This solution is a pioneering solution in the field of blockchain solvency proofs and provides a secure, efficient, and privacy-preserving method for centralized cryptocurrency service providers or Web3 enterprise custodians. It effectively addresses the challenge of proving an institution's possession of sufficient reserves to cover user assets without compromising user privacy or disclosing the institution's scale.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2025-01-17DOI: 10.1049/blc2.12094
Dominik Marchsreiter
{"title":"Towards quantum-safe blockchain: Exploration of PQC and public-key recovery on embedded systems","authors":"Dominik Marchsreiter","doi":"10.1049/blc2.12094","DOIUrl":"https://doi.org/10.1049/blc2.12094","url":null,"abstract":"<p>Blockchain technology ensures accountability, transparency, and redundancy, but its reliance on public-key cryptography makes it vulnerable to quantum computing threats. This article addresses the urgent need for quantum-safe blockchain solutions by integrating post-quantum cryptography (PQC) into blockchain frameworks. Utilizing algorithms from the NIST PQC standardization process, it is aimed to fortify blockchain security and resilience, particularly for IoT and embedded systems. Despite the importance of PQC, its implementation in blockchain systems tailored for embedded environments remains underexplored. A quantum-secure blockchain architecture is proposed, evaluating various PQC primitives and optimizing transaction sizes through techniques such as public-key recovery for Falcon, achieving up to 17% reduction in transaction size. The analysis identifies Falcon-512 as the most suitable algorithm for quantum-secure blockchains in computer-based environments and XMSS as a viable but unsatisfactory stateful alternative. However, for embedded-based blockchains, Dilithium demonstrates a higher transactions-per-second (TPS) rate compared to Falcon, primarily due to Falcon's slower signing performance on ARM CPUs. This highlights the signing time as a critical limiting factor within embedded blockchains. Additionally, smart contract functionality is integrated, assessing the impact of PQC on smart contract authentication. The findings demonstrate the feasibility and practicality, paving the way for robust and future-proof IoT applications.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143116147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2025-01-02DOI: 10.1049/blc2.12093
S. M. Masudur Rahman, Abu Naser Mohammad Saif, Sadman Kabir, Md. Fakhrudoza Bari, Md. Mahabub Alom, Md. Johir Rayhan, Fangfang Zan, Mingyue Chu, Ashis Talukder
{"title":"Blockchain in the banking industry: Unravelling thematic drivers and proposing a technological framework through systematic review with bibliographic network mapping","authors":"S. M. Masudur Rahman, Abu Naser Mohammad Saif, Sadman Kabir, Md. Fakhrudoza Bari, Md. Mahabub Alom, Md. Johir Rayhan, Fangfang Zan, Mingyue Chu, Ashis Talukder","doi":"10.1049/blc2.12093","DOIUrl":"https://doi.org/10.1049/blc2.12093","url":null,"abstract":"<p>In the new era of adopting and managing new and robust technologies in banking, the use of blockchain technology has significantly transformed overall banking systems. To add new insights to the body of existing knowledge, the authors conducted a systematic review with bibliographic network mapping to identify and analyse the factors contributing to adopting blockchain in the banking industry. Following the latest protocols of the PRISMA flowchart, this study acknowledged 16 relevant publications from 2590 papers in the databases, namely Scopus, ScienceDirect, Web of Science, and IEEE Xplore. The bibliographic data were grouped and analysed using VOSviewer to create network visualization maps that included citation and co-citation, bibliographic coupling, co-authorship, and co-occurrence of terms. Subsequently, significant terms were identified through the analyses and compared with those found in the 16 relevant papers. The aggregate findings suggest that multiple influencing factors have been recognized and later categorized into three thematic drivers: transparency-driven security, collaborative interoperability, and organizational infrastructure. The current research provides valuable insights for policymakers, technologists, researchers, consultants, and practitioners of information systems by proposing a technological framework, which will aid in developing tailored strategies to facilitate the sustainable practice of blockchain in the banking industry to a wider extent.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain based intelligent disbursement in National Scholarship Portal","authors":"Lifna Challissery Samu, Neelkanth Khithani, Kushl Alve, Vedang Gambhire, Atharva Hande, Shivam Choubey","doi":"10.1049/blc2.12092","DOIUrl":"https://doi.org/10.1049/blc2.12092","url":null,"abstract":"<p>The National Scholarship Portal in India serves as a one-stop solution for students seeking financial aid for their studies across the country. However, in this digital era, the national-level portal faces challenges such as limited provision for only government scholarships, non-automated systems, complex application processes, reliance on physical verifications, and delays in scholarship disbursement. This research proposes a blockchain-based scholarship module to address these challenges and automate the entire scholarship process. The paper emphasizes upon the transformative impact by the usage of Hyperledger fabric network, which provides a fool-proof system that streamlines the entire application process and fund disbursement. The proposed integration also ensures robust application verification, accountability of stakeholders, transparent scholarship selection criteria, automated and thorough tracking of fund disbursement, immutable transaction history, secure authorization; and stringent compliance measures. Thus, the implementation of the proposed system aims to alleviate the financial insecurities faced by students during their studies, simplify their search for scholarship opportunities, and enable them to focus more on their academic pursuits.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"407-422"},"PeriodicalIF":0.0,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142868831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy preserving large language models: ChatGPT case study based vision and framework","authors":"Imdad Ullah, Najm Hassan, Sukhpal Singh Gill, Basem Suleiman, Tariq Ahamed Ahanger, Zawar Shah, Junaid Qadir, Salil S. Kanhere","doi":"10.1049/blc2.12091","DOIUrl":"https://doi.org/10.1049/blc2.12091","url":null,"abstract":"<p>The generative Artificial Intelligence (AI) tools based on Large Language Models (LLMs) use billions of parameters to extensively analyse large datasets and extract critical information such as context, specific details, identifying information, use this information in the training process, and generate responses for the requested queries. The extracted data also contain sensitive information, seriously threatening user privacy and reluctance to use such tools. This article proposes the conceptual model called PrivChatGPT, a privacy-preserving model for LLMs consisting of two main components, that is, preserving user privacy during the data curation/pre-processing and preserving private context and the private training process for large-scale data. To demonstrate the applicability of PrivChatGPT, it is shown how a private mechanism could be integrated into the existing model for training LLMs to protect user privacy; specifically, differential privacy and private training using Reinforcement Learning (RL) were employed. The privacy level probabilities are associated with the document contents, including the private contextual information, and with metadata, which is used to evaluate the disclosure probability loss for an individual's private information. The privacy loss is measured and the measure of uncertainty or randomness is evaluated using entropy once differential privacy is applied. It recursively evaluates the level of privacy guarantees and the uncertainty of public databases and resources during each update when new information is added for training purposes. To critically evaluate the use of differential privacy for private LLMs, other mechanisms were hypothetically compared such as Blockchain, private information retrieval, randomisation, obfuscation, anonymisation, and the use of Tor for various performance measures such as the model performance and accuracy, computational complexity, privacy vs. utility, training latency, vulnerability to attacks, and resource consumption. It is concluded that differential privacy, randomisation, and obfuscation can impact the training models' utility and performance; conversely, using Tor, Blockchain, and Private Information Retrieval (PIR) may introduce additional computational complexity and high training latency. It is believed that the proposed model could be used as a benchmark for privacy-preserving LLMs for generative AI tools.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"706-724"},"PeriodicalIF":0.0,"publicationDate":"2024-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-11-04DOI: 10.1049/blc2.12090
Li Wei, Liang Peili, Li Fei
{"title":"zk-STARKs based scheme for sealed auctions in chains","authors":"Li Wei, Liang Peili, Li Fei","doi":"10.1049/blc2.12090","DOIUrl":"https://doi.org/10.1049/blc2.12090","url":null,"abstract":"<p>On-chain sealed auctions represent a novel approach to electronic bidding auctions, wherein the introduction of zero-knowledge proof technology has significantly enhanced the security of auctions. However, most mainstream on-chain sealed auction schemes currently employ Bulletproofs to prove auction correctness, which leaves room for optimization in terms of verification time and inherent security. Addressing these issues, an on-chain sealed auction scheme based on zero-knowledge succinct non-interactive argument of knowledge (zk-STARK) is proposed. This scheme leverages the decentralization and immutability of blockchain and smart contracts to eliminate third-party involvement while ensuring the security of the auction process. The Inter Planetary File System is utilized to provide a qualification review mechanism for the auctioneer, enabling the screening of unqualified bidders before the auction. Additionally, the scheme employs RSA encryption to conceal bidders' bids, Pedersen commitments to ensure the consistency of bidding information, and zk-STARKs to verify the correctness of the winning bid. Security analysis and experimental results demonstrate that the proposed scheme meets the required security standards, with time consumption at various stages of the auction being within acceptable limits, and effectively reduces the time required for proof verification.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"344-354"},"PeriodicalIF":0.0,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-10-23DOI: 10.1049/blc2.12087
Marlene Koelbing, Klaus Kieseberg, Ceren Çulha, Bernhard Garn, Dimitris E. Simos
{"title":"Modelling smurfing patterns in cryptocurrencies with integer partitions","authors":"Marlene Koelbing, Klaus Kieseberg, Ceren Çulha, Bernhard Garn, Dimitris E. Simos","doi":"10.1049/blc2.12087","DOIUrl":"https://doi.org/10.1049/blc2.12087","url":null,"abstract":"<p>In this paper, we propose the modelling of patterns of financial transactions - with a focus on the domain of cryptocurrencies - as splittings and present a method for generating such splittings utilizing integer partitions. We study current money laundering regulations and directives concerning thresholds for monitoring of financial transactions. We further exemplify that, by having the partitions respect these threshold criteria, the splittings generated from them can be used for modelling illicit transactional behavior such as is shown by smurfing. In addition, we conduct an analysis of the splittings occurring in money laundering efforts that took place in the aftermath of the Upbit hack. Based on the potential weaknesses identified by our research, we finally provide suggestions on how to improve current AML techniques and initiatives towards more effective AML efforts.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"659-680"},"PeriodicalIF":0.0,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-09-26DOI: 10.1049/blc2.12088
Payman Rezaei, Masoud AliAkbar Golkar
{"title":"Multi-objective energy management system for multi-microgrids using blockchain miners: A two-stage peak shaving and valley filling framework","authors":"Payman Rezaei, Masoud AliAkbar Golkar","doi":"10.1049/blc2.12088","DOIUrl":"https://doi.org/10.1049/blc2.12088","url":null,"abstract":"<p>This study presents an innovative energy management framework for multi-microgrids, integrating the burgeoning domain of cryptocurrency mining. Cryptocurrencies, a novel fusion of encryption technology and financial currency, are witnessing exponential global growth. This expansion correlates with a surge in the prevalence of mining activities, amplifying electricity consumption and necessitating accelerated advancements in urban transmission and distribution infrastructures, coupled with increased financial investments. Despite cryptocurrencies' growth, comprehensive research to capitalize on their potential is scarce. This article introduces an operation cost model for miners in the proposed dual-stage framework. The first stage is dedicated to day-ahead scheduling, focusing on peak shaving and valley filling in the electricity demand curve, while concurrently optimizing operational costs. The second stage, updating each 5 min, minimizes imbalances in response to uncertain network conditions. A pivotal feature of this framework is the allocation of revenues generated from mining operations towards enhancing renewable energy resources. Empirical simulations underscore the framework's efficacy, evidenced by a substantial peak shaving of 482.833 kW and valley filling of 4084.42 kW. Furthermore, this approach effectively maintains operational costs within a feasible spectrum. Notably, the demand curve's peak-to-valley distance extends to 4 MW, with the revenue from mining activities alone sufficient to offset operational expenditures.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"616-631"},"PeriodicalIF":0.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-09-26DOI: 10.1049/blc2.12086
Shusheng Guo, Cheng Chen, Qing Tong
{"title":"Secure data sharing technology of medical privacy data in the Web 3.0","authors":"Shusheng Guo, Cheng Chen, Qing Tong","doi":"10.1049/blc2.12086","DOIUrl":"https://doi.org/10.1049/blc2.12086","url":null,"abstract":"<p>The development of Web 3.0 technology may signify the dawn of a new digital era. Its concepts of co-management, co-construction, and sharing address the need for private data sharing among medical institutions. However, the sharing of private data has been challenging due to the lack of effective monitoring methods and authorization mechanisms. Additionally, controlling the scope of data sharing, providing incentives, and ensuring legal compliance have presented difficulties. To this end, a medical privacy data security sharing model based on key technologies of Web 3.0 has been proposed and implemented. It stores the source data in Inter Planetary File System by constructing an index of private data keywords, generates trapdoors using query keywords, and achieves retrieval of ciphertext data. Finally, data users apply to multiple parties for joint secure computing to obtain the use of private data. The experimental results indicate that when the size of the private data is less than 5 MB, with 3000 ciphertext indexes and three search keywords, both encryption and decryption times are around 50 ms, and the retrieval time is approximately 1.6 s. This performance is adequate for typical medical privacy sharing and computing scenarios.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 4","pages":"335-343"},"PeriodicalIF":0.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142869214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET BlockchainPub Date : 2024-08-25DOI: 10.1049/blc2.12085
Yang Liu, Jingwen Chen, Miaomiao Zhang, Shidong Shi, Feng Wang
{"title":"Serein: A parallel pipeline-based DAG schema for consensus in blockchain","authors":"Yang Liu, Jingwen Chen, Miaomiao Zhang, Shidong Shi, Feng Wang","doi":"10.1049/blc2.12085","DOIUrl":"https://doi.org/10.1049/blc2.12085","url":null,"abstract":"<p>As the core technology of blockchain, consensus mechanisms play a crucial role in ensuring the consistency and reliability of blockchain systems. In a decentralized and open system environment like blockchain, traditional consensus algorithms are often unsuitable due to their inability to tolerate arbitrary faults such as malicious node behaviour. Consequently, Byzantine fault tolerance consensus algorithms have become a focal point in blockchain systems. However, as Byzantine fault tolerance consensus algorithms have evolved, they still face significant challenges, particularly in addressing issues related to network latency and throughput. This paper proposes a parallel pipeline-based DAG schema for consensus in blockchain, Serein. Firstly, the Serein algorithm achieves functional partitioning of nodes, enhancing their scalability. Secondly, it employs a pipeline structure, allowing each block to proceed without waiting for the previous block's result, thereby reducing block generation latency. Lastly, the Serein algorithm leverages the advantages of the DAG block structure to achieve concurrent block ordering and submission, improving system throughput. Experimental results demonstrate that the proposed Serein algorithm maintains robust performance under conditions of high transaction volume with multiple nodes, effectively enhancing consensus efficiency while ensuring Byzantine fault-tolerant security.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"4 S1","pages":"681-690"},"PeriodicalIF":0.0,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}