An Anonymous yet Accountable Contract Wallet System using Account Abstraction
- URL: http://arxiv.org/abs/2309.03480v1
- Date: Thu, 7 Sep 2023 04:54:19 GMT
- Title: An Anonymous yet Accountable Contract Wallet System using Account Abstraction
- Authors: Kota Chin, Keita Emura, Kazumasa Omote,
- Abstract summary: We propose an anonymous yet accountable contract wallet system.
The proposed system provides anonymity of a transaction issuer that hides who agreed with running the contract wallet, and accountability of the issuer.
We discuss several potential applications of the proposed system, i.e., medical information sharing and asset management.
- Score: 1.9662978733004597
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Account abstraction allows a contract wallet to initiate transaction execution. Thus, account abstraction is useful for preserving the privacy of externally owned accounts (EOAs) because it can remove a transaction issued from an EOA to the contract wallet and hides who issued the transaction by additionally employing anonymous authentication procedures such as ring signatures. However, unconditional anonymity is undesirable in practice because it prevents to reveal who is accountable for a problem when it arises. Thus, maintaining a balancing between anonymity and accountability is important. In this paper, we propose an anonymous yet accountable contract wallet system. In addition to account abstraction, the proposed system also utilizes accountable ring signatures (Bootle et al., ESORICS 2015). The proposed system provides (1) anonymity of a transaction issuer that hides who agreed with running the contract wallet, and (2) accountability of the issuer, which allows the issuer to prove they agreed with running the contract wallet. Moreover, due to a security requirement of accountable ring signatures, the transaction issuer cannot claim that someone else issued the transaction. This functionality allows us to clarify the accountability involved in issuing a transaction. In addition, the proposed system allows an issuer to employ a typical signature scheme, e.g., ECDSA, together with the ring signature scheme. This functionality can be considered an extension of the common multi-signatures that require a certain number of ECDSA signatures to run a contract wallet. The proposed system was implemented using zkSync (Solidity). We discuss several potential applications of the proposed system, i.e., medical information sharing and asset management.
Related papers
- A Smart Contract-based Non-Transferable Signature Verification System using Nominative Signatures [1.9662978733004597]
We propose a smart contract-based non-transferable signature verification system using nominative signatures.<n>Our system can verify whether a money transfer actually will take place, in addition to indicating who can verify a signature.
arXiv Detail & Related papers (2025-06-20T22:54:13Z) - Epass: Efficient and Privacy-Preserving Asynchronous Payment on Blockchain [39.093148638790346]
Buy Now Pay Later (BNPL) is a rapidly proliferating e-commerce model, offering consumers to get the product immediately and defer payments.<n>Emerging blockchain technologies endow BNPL platforms with digital currency transactions, allowing BNPL platforms to integrate with digital wallets.<n>However, the transparency of transactions causes critical privacy concerns because malicious participants may derive consumers' financial statuses from on-chain asynchronous payments.
arXiv Detail & Related papers (2025-06-11T04:32:54Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [46.404531555921906]
We propose an architecture for blockchain-based PAISs aimed at preserving both confidentiality and transparency.
Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - Taming the Beast of User-Programmed Transactions on Blockchains: A Declarative Transaction Approach [0.0]
"Technology of trust" can be used to mediate transactions between non-trusting parties without the need for a central authority.
Transactions are native to the blockchain platform or user-defined via user programs called smart contracts.
Despite the significant flexibility in transaction programmability that smart contracts offer, they pose several usability, robustness, and performance challenges.
This paper proposes an alternative transaction framework that incorporates more primitives into the native set of transaction types.
arXiv Detail & Related papers (2024-11-04T20:44:14Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments [7.8925011858865695]
We propose functional adaptor signatures (FAS), a cryptographic primitive and show how it can be used to enable functional sales.
We formalize the security properties of FAS, among which is a new notion called witness privacy to capture seller's privacy.
We present multiple variants of witness privacy, namely, witness hiding, witness indistinguishability, and zero-knowledge.
arXiv Detail & Related papers (2024-10-14T23:17:03Z) - Towards Credential-based Device Registration in DApps for DePINs with ZKPs [46.08150780379237]
We propose a credential-based device registration (CDR) mechanism that verifies device credentials on the blockchain.
We present a general system model, and technically evaluate CDR using zkSNARKs with Groth16 and Marlin.
arXiv Detail & Related papers (2024-06-27T09:50:10Z) - VELLET: Verifiable Embedded Wallet for Securing Authenticity and Integrity [0.6144680854063939]
This paper proposes a new protocol to enhance the security of embedded wallets.
Our VELLET protocol introduces a wallet verifier that can match the audit trail of embedded wallets on smart contracts.
arXiv Detail & Related papers (2024-04-05T03:23:19Z) - Revocable Quantum Digital Signatures [57.25067425963082]
We define and construct digital signatures with revocable signing keys from the LWE assumption.
In this primitive, the signing key is a quantum state which enables a user to sign many messages.
Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign.
arXiv Detail & Related papers (2023-12-21T04:10:07Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - Masquerade: Simple and Lightweight Transaction Reordering Mitigation in Blockchains [5.690884793952696]
We propose an MEV aware protocol design called Masquerade to increase user satisfaction and confidence in the system.
We introduce the notion of a "token" to mitigate the actions taken by an adversary in an attack scenario.
arXiv Detail & Related papers (2023-08-29T14:42:43Z) - SigRec: Automatic Recovery of Function Signatures in Smart Contracts [40.20115707680234]
It is challenging to recover function signatures from contract bytecode, since neither debug information nor type information is present in the bytecode.
We develop SigRec, a new tool for recovering function signatures from contract bytecode without the need of source code and function signature databases.
arXiv Detail & Related papers (2023-05-11T18:03:39Z) - FedSOV: Federated Model Secure Ownership Verification with Unforgeable
Signature [60.99054146321459]
Federated learning allows multiple parties to collaborate in learning a global model without revealing private data.
We propose a cryptographic signature-based federated learning model ownership verification scheme named FedSOV.
arXiv Detail & Related papers (2023-05-10T12:10:02Z) - Quotable Signatures for Authenticating Shared Quotes [0.8875650122536799]
Quotable signature schemes are digital signature schemes with the additional property that from the signature for a message, any party can extract signatures for (allowable) quotes from the message.
We define a notion of security for quotable signature schemes and construct a concrete example of a quotable signature scheme.
We consider both how quotable signatures can be used, and why using them could help mitigate the effects of fake news.
arXiv Detail & Related papers (2022-12-21T12:07:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.