Journal
IEEE SYSTEMS JOURNAL
Volume 15, Issue 3, Pages 4367-4378Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2020.3019923
Keywords
Privacy; Protocols; Bitcoin; Permissioned blockchain; practical byzantine fault tolerance (PBFT); privacy preserving; privacy-preserving permissioned blockchain architecture (PPChain); regulation
Categories
Funding
- National Key Research and Development Program of China [2017YFB0802500]
- National Natural Science Foundation of China [61972294, 61932016, 61822202, 61772377, 61841701]
- Natural Science Foundation of Hubei Province of China [2020CFA052]
- Wuhan Municipal Science and Technology Project [2020010601012187]
- Cloud Technology Endowed Professorship
Ask authors/readers for more resources
In this article, a privacy-preserving permissioned blockchain architecture PPChain is proposed to introduce regulation and integrate cryptographic primitives while removing transaction fees and mining rewards. The architecture aims to provide a practical blockchain system for regulatory applications with qualitative security and privacy analysis and performance evaluation.
Existing (popular) blockchain architectures, including the widely used Ethereum and Hyperledger, are generally not designed to achieve conflicting properties such as anonymity and regulation, and transparency and confidentiality. In this article, we propose a privacy-preserving permissioned blockchain architecture (PPChain) that permits one to also introduce regulation, where PPChain's architecture is modified from that of Ethereum. Specifically, we integrate the cryptographic primitives (group signature and broadcast encryption), and adopt practical byzantine fault tolerance consensus protocol with a validate-record separation mechanism, as well as removing the transaction fee and mining reward. To show the utility of PPChain, we provide qualitative security and privacy analysis, and performance analysis. We also explain how PPChain can be deployed in regulation applications, using cryptocurrency, food supply chain, and sealed-bid auctions as examples.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available