An Anonymous Trust-Marking Scheme on Blockchain Systems

by   Teppei Sato, et al.

During the Coincheck incident, which recorded the largest damages in cryptocurrency history in 2018, it was demonstrated that using Mosaic token can have a certain effect. Although it seems attractive to employ tokens as countermeasures for cryptocurrency leakage, Mosaic is a specific token for the New Economy Movement (NEM) cryptocurrency and is not employed for other blockchain systems or cryptocurrencies. Moreover, although some volunteers tracked leaked NEM using Mosaic in the CoinCheck incident, it would be better to verify that the volunteers can be trusted. Simultaneously, if someone (e.g., who stole cryptocurrencies) can identify the volunteers, then that person or organization may be targets of them. In this paper, we propose an anonymous trust-marking scheme on blockchain systems that is universally applicable to any cryptocurrency. In our scheme, entities called token admitters are allowed to generate tokens adding trustworthiness or untrustworthiness to addresses. Anyone can anonymously verify whether these tokens were issued by a token admitter. Simultaneously, only the designated auditor and no one else, including nondesignated auditors, can identify the token admitters. Our scheme is based on accountable ring signatures and commitment, and is implemented on an elliptic curve called Curve25519, and we confirm that both cryptographic tools are efficient. Moreover, we also confirm that our scheme is applicable to Bitcoin, Ethereum, and NEM.



There are no comments yet.


page 1

page 2

page 3

page 4


Bootstrapping a stable computation token

We outline a token model for Truebit, a retrofitting, blockchain enhance...

UTXO in Digital Currencies: Account-based or Token-based? Or Both?

There are different interpretations of the terms "tokens" and "token-bas...

Distributed Ledger Privacy: Ring Signatures, Möbius and CryptoNote

Distributed ledger and blockchain systems are expected to make financial...

Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token

With the large-scale deployment of industrial internet of things (IIoT) ...

Confidential Token-Based License Management

In a global economy with many competitive participants, licensing and tr...

Enhancing Engagement in Token-Curated Registries via an Inflationary Mechanism

Token Curated Registries (TCR) are decentralized recommendation systems ...

Tracking Counterfeit Cryptocurrency End-to-end

The production of counterfeit money has a long history. It refers to the...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.