sys: A Privacy-preserving Scheme for Reputation-based Blockchain System
sys:一种基于信誉的区块链系统隐私保护方案
sys:評判ベースのブロックチェーンシステムのためのプライバシー保護方式
sys:신뢰 를 바탕 으로 하 는 블록 체인 시스템 의 프라이버시 보호 방안
sys: un esquema de protección de la privacidad del sistema de cadena de bloques basado en la reputación
sys: un système de protection de la vie privée basé sur la réputation du système blockchain
sys: программа защиты конфиденциальности, основанная на доверии к блочной системе
¹ Ping An Technology, Shenzhen, China
中国 深圳 平安科技
² Nanyang Technological University, Singapore
³ Theory Lab of 2012 Labs, Huawei, Shenzhen, China
中国 深圳 华为2012实验室理论实验室
⁴ School of Computer Science, Wuhan University, Wuhan, China
中国 武汉 武汉大学计算机学院
⁵ Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong
香港 香港科技大学计算机科学与工程系
⁶ College of Electrical Engineering, Zhejiang University, Hangzhou, China
中国 杭州 浙江大学电气工程学院
Reputation/Trust-based blockchain systems have attracted considerable research interests for better integrating Internet-of-Things with blockchain in terms of throughput, scalability, energy efficiency and incentive aspects. However, most existing works only consider static adversaries. Hence, they are vulnerable to slowly adaptive attackers, who can target validators with high reputation value to severely degrade the system performance. Therefore, we introduce , a privacy-preserving scheme tailored for reputation-based blockchains.
Our basic idea is to hide both the identity and reputation of the validators by periodically changing the identity and reputation commitments (i.e., aliases), which makes it much more difficult for slowly adaptive attackers to identify validators with high reputation value. To realize this idea, we utilize privacy-preserving Pedersen-commitment-based reputation updating and leader election schemes that operate on concealed reputations within an epoch.
We also introduce a privacy-preserving identity update protocol that changes the identity and time-window-based cumulative reputation commitments during each epoch transition. We have implemented and evaluated on the Amazon Web Service. The experimental results and analysis show that achieves great privacy-preserving features against slowly adaptive attacks with little overhead.