ZERO KNOWLEDGE PROOF FOR HOMOMORPHICALLY ENCRYPTED TRANSACTIONS IN 5IRE BLOCKCHAIN

Authors: Vilma Mattila, Prateek Dwivedi, Pratik Gauri & Dhanraj Dadhich

ABSTRACT

Since public blockchains are permissionless, it is subject to passive adversarial attack. In 5irechain we have addressed the security problem related to this passive adversarial activity by applying 5ireHE, a homomorphic encryption technique that encrypts the transactional details using the receiver’s public key. Since the transaction is encrypted by the receiver’s public key, it is harder for other validators to validate the transaction in 5ire. In this paper, we introduce ZKP for validating the transaction in a sense that validator can check if the sender’s previous balance and the remaining balance are in harmony with the amount of the transaction despite the difference in public keys that are used for the encryption of transaction and the encryption of account balance.

REFERENCES

  • Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, and Howard Wu. Zexe: Enabling decentralized private computation. In 2020 IEEE Symposium on Security and Privacy (SP), pages 947–964. IEEE, 2020.
  • Benedikt  Bu¨nz,  Shashank  Agrawal,  Mahdi  Zamani,  and  Dan  Boneh.   Zether:  To- wards privacy in a smart contract world. In International Conference on Financial Cryptography and Data Security, pages 423–443. Springer, 2020.
  • Yun Chen, Hui Xie, Kun Lv, Shengjun Wei, and Changzhen Hu. Deplest: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks. Information Sciences, 501:100–117, 2019.
  • Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, and Dawn Song. Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pages 185–200. IEEE, 2019.
  • Muneeb Ul Hassan, Mubashir Husain Rehmani, and Jinjun Chen. Privacy preserva- tion in blockchain based iot systems: Integration issues, prospects, challenges, and future research directions. Future Generation Computer Systems, 97:512–529, 2019.
  • Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papaman- thou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In 2016 IEEE symposium on security and privacy (SP), pages 839–858. IEEE, 2016.
  • Nir Kshetri. Blockchain’s roles in strengthening cybersecurity and protecting pri- vacy. Telecommunications policy, 41(10):1027–1038, 2017.
  • Vilma Mattila, Prateek Dwivedi, Pratik Gauri, and MD Ahbab. Homomorphic encryption in 5ire blockchain. International Journal of Social Sciences and Man- agement Review, 05, 2022.
  • Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, and Martin Vechev. zkay: Specifying and enforcing data privacy in smart contracts. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communi- cations Security, pages 1759–1776, 2019.