Design a Blockchain based Electronic Payment with Users’ Anonymity

Document Type : Original Article

Authors

Shahed Uni

Abstract

Security of electronic payment systems have become important, by increasing demand. Protecting against double spending, tracing malicious users, users' anonymity and privacy-preserving are important secure goals of any electronic payment systems. To achieve these goals, blockchain technology is useful, blockchain technology can solve many issues, such as bottlenecks, delays and operational risks that exist in the financial industry, but blockchain-based electronic payment systems cannot punish or trace malicious users without using trusted third party. In this article, we present a blockchain-based electronic payment scheme to protecting the anonymity and privacy of honest users, and also trace and punish malicious users with no need to TTP. We have used a fair blind digital signature scheme and a secret sharing scheme for this purpose. Users also use pseudonyms to maintain anonymity. users' pseudonyms are generated by pre-computations, therefore, the proposed scheme have a good performance.

Keywords


[1]                 N. Radziwill, “Blockchain revolution: How the technology behind Bitcoin is changing money, business, and the world,” The Quality Management Journal, vol. 25(1): pp. 64-65, 2018.##
[2]                 J.-S. Chou, et al., “A Novel ID-based Electronic Cash System from Pairings,” IACR Cryptology ePrint Archive, p. 339, 2009.##
[3]                S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system, 2008.##
[4]             Y. Guo and C. Liang, “Blockchain application and outlook in the banking industry,” Financial Innovation, vol. 2(1), p. 24, 2016.##
[5]             Z. Qin, et al., “A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing,” Computer Standards & Interfaces, vol. 54, pp. 55-60, 2017.##
[6]             X. Chen, et al., “New and efficient conditional e-payment systems with transferability,” Future Generation Computer Systems, vol. 37, pp. 252-258, 2014.##
[7]             E. Heilman, F. Baldimtsi, and S. Goldberg, “Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions,” in International conference on financial cryptography and data security, Springer, 2016.##
[8]                  L. Zhong, et al., “A secure versatile light payment system based on blockchain,” Future Generation Computer Systems, vol. 93, pp. 327-337, 2019.##
[9]                  F.  Gao, et al., “A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks,” IEEE Network, vol. 32(6), pp. 184-192, 2018.##
[10]           E. F. Jesus, et al., “A survey of how to use blockchain to secure internet of things and the stalker attack,” Security and Communication Networks, 2018.##
[11]               P.-Y.   Chang, M.-S. Hwang, and C.-C. Yang, “A blockchain-based traceable certification system,” in International Conference on Security with Intelligent Computing and    Big-data Services, Springer, 2017.##
[12]           L.     Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem ACM Transactions on Progamming Languages and Syetems,” vol. 4, no. 3, pp. 382-401, July 1982.##
[13]          Yin, W., et al., “An anti-quantum transaction authentication approach in blockchain,” IEEE Access, vol. 6, pp. 5393-5401, 2018.##
[14]              W.    Stallings, “Network and internetwork security principles and practice,” Prentice Hall Englewood Cliffs, NJ., vol. 1, 1995.##
[15]          M. Abe and M. Ohkub, “Provably Secure air Blind Signatures with Tight Revocation. inInternational Conference on the Theory and Application of Cryptology and Information Security, Springer, 2001.##
[16]          L. Zhang, et al., “Blockchain based secure data sharing system for Internet of vehicles: A position paper,” Vehicular Communications, vol. 16, pp. 85-93, 2019.##
[17]          S. K. Langford, “Threshold DSS signatures without a trusted party,” in Annual International Cryptology Conference, Springer, 1995.##
[18]               D.    Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ECDSA),” International journal of information security, vol. 1(1), pp. 36-63, 2001.##
[19]          M. H. Kazemi, et al, “A secure three factor authentication scheme for wireless healthcare sensor networks based on elliptic curve,” Advanced Defence Sci.& Tech., vol. (1)8, pp. 147-167, 2020. (In Persian)##
 
Volume 9, Issue 2 - Serial Number 34
Serial No. 34, Summer Quarterly
June 2021
Pages 85-100
  • Receive Date: 26 August 2020
  • Revise Date: 01 November 2020
  • Accept Date: 11 January 2021
  • Publish Date: 22 June 2021