blockchain2
blockchain2
net/publication/369672172
Cryptography of Blockchain
CITATION READS
1 2,521
6 authors, including:
Nengxiang Xu Kuan-Ching Li
Hunan University of Science and Technology Providence University
2 PUBLICATIONS 2 CITATIONS 481 PUBLICATIONS 6,788 CITATIONS
All content following this page was uploaded by Jiahong Cai on 14 June 2023.
2 Hunan Key Laboratory for Service computing and Novel Software Technology,
Xiangtan 411201, China
[email protected],[email protected],[email protected],jiah
[email protected], [email protected], [email protected]
1 Introduction
blockchain technology will be a revolutionary technology to solve the trust crisis in the
future society [4].
As blockchain continues to develop, there is a greater demand for data protection,
anonymity and untraceability [5] in many fields. Blockchain is no longer only used for
virtual currencies [6] but is also being extended to various fields such as healthcare,
copyright protection and finance. For example, blockchain is currently the most effec-
tive solution for personal privacy protection and sharing [7]. As part of the big data
trend [8], the growing scale of the Internet of Things (IoT) [9] and the sharing of its
data requires the use of blockchain. Many insider attacks are caused by trust issues, and
blockchain can solve the problem of trust between untrustworthy users [10]. However,
the rise of blockchain technology in various fields has brought about many security
issues. For example, privacy protection and transaction protection. Also, with the de-
velopment of quantum computing, which may break many cryptographic systems [11],
the cryptography of blockchain will be severely challenged. With the emergence of
various attacks, various cryptography-based blockchain security protection techniques
are gradually developed [12]. Therefore, this paper will study the cryptography tech-
niques in blockchain.
2 Blockchain Overview
transactions packed in the block have been altered and, if found to have been altered, a
quick way to locate the altered transaction.
Blockchain is a promising and growing technology but also faces many challenges.
These challenges arise from the existing computer system [15-17] and network archi-
tecture [18-20], the consensus mechanisms used in the blockchain and the need for data
protection [21-23]. With the development of blockchain and the development and pro-
motion of the application of 5G technology, blockchain is gradually applied to various
industries such as healthcare [24], industry [25], and finance [26]. While blockchain is
widely used, it also raises a series of security and privacy issues. The digital currencies
used in blockchain have also suffered many security threats, with attacks on trading
platforms, theft of currencies and crimes committed by hackers and criminals using
blockchain's anonymous transactions occurring frequently. At the same time, privacy
breaches [27-28] in blockchain can also make the skeptical public of blockchain. These
challenges are very detrimental to the development and innovation of blockchain.
3 Typical cryptography
The idea of homomorphic encryption was first introduced by Rivest, Adleman and
Detouzos [29] (the R and A in "RSA") in 1978. Homomorphic data encryption allows
direct manipulation of the encrypted data without the need for preliminary decryption
of the operands. The effect of manipulating the encrypted data is the same as manipu-
lating the data before encryption. In a blockchain, FHE ( fully homomorphic encryp-
tion) ensures that the ledger information is not compromised but can be manipulated,
even if the blockchain is attacked. FHE is a good solution to the problem of data being
used on remote devices [30]. In 2009, Gentry [31] proposed a secure and reasonable
FHE system that performs arbitrary addition and multiplication operations on the en-
crypted data while also acting on the pre-encrypted data. However, the performance of
FHE algorithms is so poor that they are difficult to use in practice. In 2011, Brakerski
et al. [32] proposed a new FHE algorithm, BVG, based on Learning With Errors
(LWE), an alternative assumption to lattice encryption. The BGV system uses a some-
what more practical LWE assumption than the system proposed by Gentry in 2009. In
2013, Gentry [33] et al. proposed a simpler, FHE algorithm GSW based on LWE. In
their scheme, they proposed a way to construct FHE of a new technique known as the
approximate eigenvector method.
Zero-knowledge proof means that the prover does not need to reveal anything about the
verification to the verifier who can also do the verification. With the use of zero-
4
knowledge proofs in blockchain, other nodes can verify the legitimacy and correctness
of a transaction even if both parties do not reveal any information about the transaction.
Zero-knowledge proofs are divided into interactive zero-knowledge proofs and non-
interactive zero-knowledge proofs. Interactive zero-knowledge proofs require multiple
interactions between the verifier and the prover, and the verifier improves the trustwor-
thiness of the prover by performing multiple verifications to the prover. Non-interactive
zero-knowledge proofs, on the other hand, allow the verifier and the prover to interact
once with the aid of a machine. An overview of the development of zero-knowledge
proofs is given next.
2018, the Bulletproofs algorithm was introduced to eliminate the need for trusted set-
tings. It is a more efficient algorithm that produces proofs of logarithmically trans-
formed size, which would be very beneficial for storing proofs in the blockchain. More-
over, Bulletproofs can also merge and compress proofs of the same scope, reducing the
size of the space occupied by the blockchain. In 2018, a new zero-knowledge proof
scheme ZK-STARKS was also proposed [40], a zero-knowledge proof scheme that
does not require trustworthy settings. ZK-STARKS has better scalability, and its proof
and verification times are linearly and logarithmically related to the initial computation
time, respectively. As the initial size increases, its proof and verification times do not
increase significantly. The more widely used non-interactive zero-knowledge proofs
for blockchain applications are ZK-SNARKS, Bulletproofs and ZK-STARKS.
Secure Muti-party Computation (SMPC) is derived from the "millionaire problem" pro-
posed by Professor Yao in 1982, i.e.. Collaborative multi-party computing with third-
party guarantees may carry the risk of information leakage from third-party organiza-
tions. SMPC enables distributed parties to jointly compute arbitrary functions without
revealing their own private inputs and outputs. In the SMPC scenario, there are
n(n ≥ 2) participants performing multi-party collaboration to compute an objective
function f ( x1 , x2 ,..., xn ) = ( y1 , y2 ,..., yn ) , where x1 , x2 ,..., xn are the input infor-
mation of each party. When the computation is finished, each participant does not get
any other information except its own corresponding output yi , Also no input infor-
mation can be deduced from the input results.
does not require the use of mnemonic word and keys, but rather uses a gated signature
method that combines the advantages of multi-signature and secret sharing. However,
there are still difficulties that need to be addressed in the application of SMPC in block-
chain, such as the fact that SMPC requires the participation of multiple honest nodes,
malicious nodes may collude in the computation [42], and the efficiency of SMPC is
low when the network transmission rate is low.
4 Post-Quantum Cryptography
n
L( B) ∑ xi bi , xi ∈
= = Z , i 1, 2,..., n (1)
i =1
The security of cryptographic algorithms relies on the underlying mathematical
problem. Furthermore, the two main difficulties in lattice problems: are the difficulty
of solving the shortest vector and the difficulty of solving the nearest vector. These
problems have worst-case difficulty [46]. Many scholars have conducted many studies
on lattice problems. The most famous algorithm is the LLL proposed by H. Lenstra, A.
Lenstra and Lovasz in 1982 [47], however it can only solve the shortest vector in pol-
( n −1)/2
ynomial time with an approximation factor (1 + ε ) 4 / 3 of (where it is a con-
stant). Thus lattice-based cryptography is quantum resistant.
7
The hash-based signature algorithm was proposed by Leslie Lamport in 1979, but com-
pared to other signature schemes, it did not to be widely used because it could produce
relatively long signatures. With the arrival of the threat of quantum computing, it is
gradually gaining attention again because hash-based signature counting has quantum-
resistant properties, such as being resistant to attacks by Shor algorithms. It is one of
the algorithms that have the potential to replace the traditional signature algorithm [49].
The one proposed by Leslie Lamport is a single hash signature, which cannot sign mul-
tiple messages, and was later improved by Ralph Merkle to form a multiple signature
algorithm based on the Merkle tree. The public key is the root of the Merkle, and the
key is each leaf node in the Merkle tree. The quantum resistance of Hash-based signa-
ture algorithm is based on the collision resistance of the Hash function because the
current quantum algorithms cannot find the collision of the Hash. Swati Kumari [50]
proposed an enhanced hash-based post-quantum cipher (PQC) architecture called sig-
nature-based Merkle hash multiplication (SMHM) algorithm. The hash Merkle signa-
ture-based algorithm is enhanced by using the Bernoulli-Karatsuba multiplication al-
gorithm. Konstantinos Chalkias [51] proposed a scalable post-quantum cryptography
scheme based on Merkle tree signatures suitable for blockchains and distributed ledg-
ers, which can utilize dedicated chains or image structures to reduce the cost of key
generation, signing, verification, and the size of signatures.
4.3 Code based cryptography
The code-based cryptosystem is derived from McEliece [52]. The algorithm is based
on the integrable binary Goppa code called classical McEliece. The encryption and de-
cryption of the McEliece cryptosystem are fast and secure. However, it is rarely used
in practice because of the large size of the key, so one of the subsequent directions of
research on code-based cryptography is to reduce the size of its key. The general linear
decoding hard problem on which McEliece cryptographic algorithm is based is the NP-
hard problem [53], so coding-based cryptography is very promising in quantum-re-
sistant cryptography. Moreover, the NIST post-quantum cryptographic algorithm
standard collection has coding-based cryptography second only to lattice-based cryp-
tography. It is mainly used in public key encryption algorithms and only two for signa-
ture algorithms.
8
The security of the multivariate-based cryptography regime relies on solving the math-
ematical problem of solving a system of random multivariate quadratic polynomial
equations over a finite field, which is nondeterministic polynomial time-hard. There is
no finite algorithm for solving this problem. The multivariate quadratic polynomial
problem is to find a solution in a system of quadratic polynomial equations in a given
finite field. Since multivariate based cryptographic systems emerged late, they still need
a lot of research and experiments to prove their security [54]. Although earlier multi-
variable-based signature systems have been breached and are no longer secure, multi-
variable-based signature algorithms are small in signature size and fast in inflammation.
Therefore, multivariate based signature schemes are still very promising, and multivar-
iate based signature algorithms are the most numerous in the NIST post-quantum cryp-
tographic algorithm standards collection.
5 Conclusion
With the application of the blockchain, the blockchain needs to meet various different
needs for data protection, multi-party participation and collaboration, and identity au-
thentication in the face of different scenarios, and cryptography is crucial to the devel-
opment of blockchain applications. In this paper, some classical cryptography and post-
quantum cryptography in blockchain were studied. First, the origin of blockchain and
its concepts were introduced, and the structure of Bitcoin and the security challenges it
faces were presented. Subsequently, some classical cryptographic homomorphic en-
cryption, zero-knowledge proofs and secure multi-party computation used in block-
chains were investigated. Finally, four more promising post-quantum cryptograms were
introduced for quantum computing attacks.
References
1. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Decentralized Business Re-
view, 2008: 21260.
2. Liang W, Xiao L, Zhang K, et al. Data fusion approach for collaborative anomaly intrusion
detection in blockchain-based systems[J]. IEEE Internet of Things Journal, 2021.
3. P Kumar, R Kumar, et al., PPSF: a privacy-preserving and secure framework using block-
chain-based machine-learning for IoT-driven smart cities, IEEE Transactions on Network
Science and Engineering 8 (3), 2326-2341, 2021.
4. He W, Zheng H. Literature Review on Block Chain: Technology, Principle and Develop-
ment[C]//Journal of Physics: Conference Series. IOP Publishing, 2021, 1848(1): 012166.
5. Xu Z, Liang W, Li K C, et al. A Time-sensitive Token-Based Anonymous Authentication
and Dynamic Group Key Agreement Scheme for Industry 5.0[J]. IEEE TII, 2021.
6. Gorkhali A, Li L, Shrestha A. Blockchain: A literature review[J]. Journal of Management
Analytics, 2020, 7(3): 321-343.
7. W. Liang, Y. Yang, C. Yang, Y. Hu, S. Xie, K. C. Li, and J. Cao, "PDPChain: A Consortium
Blockchain-Based Privacy Protection Scheme for Personal Data," IEEE Transactions on Re-
liability, pp. 1-13, 2022, doi: 10.1109/TR.2022.3190932.
9
32. Brakerski Z, Vaikuntanathan V. Fully homomorphic encryption from ring-LWE and secu-
rity for key dependent messages, Crypto. Conf., Springer, Heidelberg, 2011: 505-524.
33. Gentry C, Sahai A, Waters B. Homomorphic encryption from learning with errors: Concep-
tually-simpler, asymptotically-faster, attribute-based[C]//Annual Cryptology Conference.
Springer, Berlin, Heidelberg, 2013: 75-92.
34. Goldwasser S, Micali S, Rackoff C. The knowledge complexity of interactive proof-sys-
tems, Providing Sound Found. for Crypto.: On the Work of Shafi Goldwasser and Silvio
Micali. 2019: 203-225.
35. Chor B, Goldwasser S, Micali S, et al. Verifiable secret sharing and achieving simultaneity
in the presence of faults, 26th IEEE Sym. on Found. of Comp. Sci. (SFCS), 1985: 383-395.
36. Groth J. Short pairing-based non-interactive zero-knowledge arguments, Int’l Conf. on the
Theory and Appl. of Crypt. and Info. Security. Springer, Berlin, Heidelberg, 2010: 321-340.
37. Parno B, Howell J, Gentry C, et al. Pinocchio: Nearly practical verifiable computation[J].
Communications of the ACM, 2016, 59(2): 103-112.
38. Banerjee A, Clear M, Tewari H. Demystifying the Role of zk-SNARKs in Zcash, IEEE conf.
on application, info. and network security (AINS), 2020: 12-19.
39. Groth J. On the size of pairing-based non-interactive arguments, Int’l conf. on the theory
and applications of crypto. techniques. Springer, Berlin, Heidelberg, 2016: 305-326.
40. Sasson E B, Chiesa A, Garman C, et al. Zerocash: Decentralized anonymous payments from
bitcoin[C]//2014 IEEE symposium on security and privacy. IEEE, 2014: 459-474.
41. Lindell Y. Fast secure two-party ECDSA signing[C]//Annual International Cryptology Con-
ference. Springer, Cham, 2017: 613-644.
42. Wang Z, Cheung S C S, Luo Y. Information-theoretic secure multi-party computation with
collusion deterrence, IEEE Trans. on Info. Forensics and Security, 2016, 12(4): 980-995.
43. Bernstein D J, Lange T. Post-quantum cryptography[J]. Nature, 2017, 549(7671): 188-194.
44. Shor P W. Algorithms for quantum computation: discrete logarithms and factoring, 35th
annual symposium on foundations of computer science. IEEE, 1994: 124-134.
45. Grover L K. A fast quantum mechanical algorithm for database search[C]//Proceedings of
the twenty-eighth annual ACM symposium on Theory of computing. 1996: 212-219.
46. Esgin M F, Steinfeld R, et al. Short lattice-based one-out-of-many proofs and applications
to ring signatures, Int’l Conf. on Applied Crypto. and Netw. Secu., Springer, 2019: 67-88.
47. Lenstra A K, Lenstra H W, Lovász L. Factoring polynomials with rational coefficients[J].
Mathematische annalen, 1982, 261(ARTICLE): 515-534.
48. Micciancio D, Regev O. Lattice-based cryptography[M]//Post-quantum cryptography.
Springer, Berlin, Heidelberg, 2009: 147-191.
49. Merkle R C. Secrecy, authentication, and public key systems[M]. Stanford university, 1979.
50. Kumari S, Singh M, Singh R, et al. Signature based Merkle Hash Multiplication algorithm
to secure the communication in IoT devices, Knowledge-Based Syst., 2022, 253: 109543.
51. Chalkias K, Brown J, Hearn M, et al. Blockchained post-quantum signatures, IEEE iTh-
ings/GreenCom/CPSCom/SmartData, 2018: 1196-1203.
52. McEliece R J. A public-key cryptosystem based on algebraic[J]. Coding Thv, 1978, 4244:
114-116.
53. Chaulet J, Sendrier N. Worst case QC-MDPC decoder for McEliece cryptosystem[C]//2016
IEEE International Symposium on Information Theory (ISIT). IEEE, 2016: 1366-1370.
54. Ding J, Yang B Y. Multivariate public key cryptography[M]//Post-quantum cryptography.
Springer, Berlin, Heidelberg, 2009: 193-241., last accessed 2016/11/21.