An Anonymous Trust-Marking Scheme on Blockchain Systems

10/01/2020
by   Teppei Sato, et al.
0

During the Coincheck incident, which recorded the largest damages in cryptocurrency history in 2018, it was demonstrated that using Mosaic token can have a certain effect. Although it seems attractive to employ tokens as countermeasures for cryptocurrency leakage, Mosaic is a specific token for the New Economy Movement (NEM) cryptocurrency and is not employed for other blockchain systems or cryptocurrencies. Moreover, although some volunteers tracked leaked NEM using Mosaic in the CoinCheck incident, it would be better to verify that the volunteers can be trusted. Simultaneously, if someone (e.g., who stole cryptocurrencies) can identify the volunteers, then that person or organization may be targets of them. In this paper, we propose an anonymous trust-marking scheme on blockchain systems that is universally applicable to any cryptocurrency. In our scheme, entities called token admitters are allowed to generate tokens adding trustworthiness or untrustworthiness to addresses. Anyone can anonymously verify whether these tokens were issued by a token admitter. Simultaneously, only the designated auditor and no one else, including nondesignated auditors, can identify the token admitters. Our scheme is based on accountable ring signatures and commitment, and is implemented on an elliptic curve called Curve25519, and we confirm that both cryptographic tools are efficient. Moreover, we also confirm that our scheme is applicable to Bitcoin, Ethereum, and NEM.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/16/2022

Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and the Binance Smart Chain (BNB)

In this work, we perform a longitudinal analysis of the BNB Smart Chain ...
research
02/07/2019

Distributed Ledger Privacy: Ring Signatures, Möbius and CryptoNote

Distributed ledger and blockchain systems are expected to make financial...
research
03/16/2021

Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token

With the large-scale deployment of industrial internet of things (IIoT) ...
research
08/08/2019

Bootstrapping a stable computation token

We outline a token model for Truebit, a retrofitting, blockchain enhance...
research
11/28/2018

Detecting Token Systems on Ethereum

We propose and compare two approaches to identify smart contracts as tok...
research
05/10/2022

To incentivize or not: Impact of blockchain-based cryptoeconomic tokens on human information sharing behavior

Cryptoeconomic incentives in the form of blockchain-based tokens are see...
research
11/23/2018

Enhancing Engagement in Token-Curated Registries via an Inflationary Mechanism

Token Curated Registries (TCR) are decentralized recommendation systems ...

Please sign up or login with your details

Forgot password? Click here to reset