Yu Cao , Xuehui Du , Xiangyu Wu , Qiantao Yang , Wenjuan Wang , Shihao Wang
{"title":"基于群签名和防弹的高效财团b区块链隐私保护方案","authors":"Yu Cao , Xuehui Du , Xiangyu Wu , Qiantao Yang , Wenjuan Wang , Shihao Wang","doi":"10.1016/j.compeleceng.2025.110323","DOIUrl":null,"url":null,"abstract":"<div><div>Compared to the public blockchain, the consortium blockchain restricts nodes’ read and write permissions; however, in the transaction transfer process, the ledger is transparent to all parties involved, and research continues to focus on the security of private data during the transaction. Most current blockchain privacy protection schemes concentrate on protecting the transaction amount’s privacy, but the issue of identify exposure of both parties during the transaction process has not received enough attention, and the transaction legitimacy verification strategy may lead to inadequate security due to the use of ineffective cryptographic algorithms. This paper proposes a scheme for <u>b</u>lockchain <u>p</u>rivacy <u>p</u>rotection based on <u>g</u>roup <u>s</u>ignatures and <u>b</u>ulletproofs (BPPGSB). To guarantee that the identities of both parties are hidden from the common nodes, verifiable to the verification nodes, and traceable to the group administrator nodes, the ElGamal algorithm on elliptic curves (EC-ElGmal) is employed to process and improve interaction processes that may reveal identity information in the original group signature scheme. Meanwhile, the bulletproofs, a zero-knowledge proof algorithm based on Pedersen commitment, is developed to validate the transaction legitimacy process both comprehensively and effectively. Together with the whole validation strategy for the transaction with a transaction amount greater than zero and transaction balance greater than or equal to zero, the verification process ensures no exposure of the actual transaction data involved in the transaction. The experimental results indicate that, compared to the current scheme, the entire transaction process can hide the identities and transaction details of the two parties involved in the transaction, the transaction validation algorithm is more effective, and the validation strategy is more comprehensive. Also, the running time of our approach is less than existing privacy protection schemes.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110323"},"PeriodicalIF":4.0000,"publicationDate":"2025-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An efficient consortium blockchain privacy protection scheme based on group signatures and bulletproofs\",\"authors\":\"Yu Cao , Xuehui Du , Xiangyu Wu , Qiantao Yang , Wenjuan Wang , Shihao Wang\",\"doi\":\"10.1016/j.compeleceng.2025.110323\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Compared to the public blockchain, the consortium blockchain restricts nodes’ read and write permissions; however, in the transaction transfer process, the ledger is transparent to all parties involved, and research continues to focus on the security of private data during the transaction. Most current blockchain privacy protection schemes concentrate on protecting the transaction amount’s privacy, but the issue of identify exposure of both parties during the transaction process has not received enough attention, and the transaction legitimacy verification strategy may lead to inadequate security due to the use of ineffective cryptographic algorithms. This paper proposes a scheme for <u>b</u>lockchain <u>p</u>rivacy <u>p</u>rotection based on <u>g</u>roup <u>s</u>ignatures and <u>b</u>ulletproofs (BPPGSB). To guarantee that the identities of both parties are hidden from the common nodes, verifiable to the verification nodes, and traceable to the group administrator nodes, the ElGamal algorithm on elliptic curves (EC-ElGmal) is employed to process and improve interaction processes that may reveal identity information in the original group signature scheme. Meanwhile, the bulletproofs, a zero-knowledge proof algorithm based on Pedersen commitment, is developed to validate the transaction legitimacy process both comprehensively and effectively. Together with the whole validation strategy for the transaction with a transaction amount greater than zero and transaction balance greater than or equal to zero, the verification process ensures no exposure of the actual transaction data involved in the transaction. The experimental results indicate that, compared to the current scheme, the entire transaction process can hide the identities and transaction details of the two parties involved in the transaction, the transaction validation algorithm is more effective, and the validation strategy is more comprehensive. Also, the running time of our approach is less than existing privacy protection schemes.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"124 \",\"pages\":\"Article 110323\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2025-04-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790625002666\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625002666","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
An efficient consortium blockchain privacy protection scheme based on group signatures and bulletproofs
Compared to the public blockchain, the consortium blockchain restricts nodes’ read and write permissions; however, in the transaction transfer process, the ledger is transparent to all parties involved, and research continues to focus on the security of private data during the transaction. Most current blockchain privacy protection schemes concentrate on protecting the transaction amount’s privacy, but the issue of identify exposure of both parties during the transaction process has not received enough attention, and the transaction legitimacy verification strategy may lead to inadequate security due to the use of ineffective cryptographic algorithms. This paper proposes a scheme for blockchain privacy protection based on group signatures and bulletproofs (BPPGSB). To guarantee that the identities of both parties are hidden from the common nodes, verifiable to the verification nodes, and traceable to the group administrator nodes, the ElGamal algorithm on elliptic curves (EC-ElGmal) is employed to process and improve interaction processes that may reveal identity information in the original group signature scheme. Meanwhile, the bulletproofs, a zero-knowledge proof algorithm based on Pedersen commitment, is developed to validate the transaction legitimacy process both comprehensively and effectively. Together with the whole validation strategy for the transaction with a transaction amount greater than zero and transaction balance greater than or equal to zero, the verification process ensures no exposure of the actual transaction data involved in the transaction. The experimental results indicate that, compared to the current scheme, the entire transaction process can hide the identities and transaction details of the two parties involved in the transaction, the transaction validation algorithm is more effective, and the validation strategy is more comprehensive. Also, the running time of our approach is less than existing privacy protection schemes.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.