A Practical Post-Quantum Distributed Ledger Protocol for Financial Institutions
- URL: http://arxiv.org/abs/2603.05005v1
- Date: Thu, 05 Mar 2026 09:54:12 GMT
- Title: A Practical Post-Quantum Distributed Ledger Protocol for Financial Institutions
- Authors: Yeoh Wei Zhu, Naresh Goud Boddu, Yao Ma, Shaltiel Eloul, Giulio Golinelli, Yash Satsangi, Rob Otter, Kaushik Chakraborty,
- Abstract summary: Traditional financial institutions face inefficiencies that can be addressed by distributed ledger technology.<n>A primary barrier to adoption is the privacy concerns surrounding publicly available transaction data.<n>We propose a post-quantum, lattice-based transaction scheme for encrypted ledgers.
- Score: 8.147413857595303
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Traditional financial institutions face inefficiencies that can be addressed by distributed ledger technology. However, a primary barrier to adoption is the privacy concerns surrounding publicly available transaction data. Existing private protocols for distributed ledger that focus on the Ring-CT model are not suitable for adoption for financial institutions. We propose a post-quantum, lattice-based transaction scheme for encrypted ledgers which better aligns with institutions' requirements for confidentiality and audit-ability. The construction leverages various zero-knowledge proof techniques, and introduces a new method for equating two commitment messages, without the capability to open one of the commitment during the re-commitment. Subsequently, we build a publicly verifiable transaction scheme that is efficient for single or multi-assets, by introducing a new compact range-proof. We then provide a security analysis of it. The techniques used and the proofs constructed could be of independent interest.
Related papers
- Cross-Chain Sealed-Bid Auctions Using Confidential Compute Blockchains [12.944520640892316]
Sealed-bid auctions ensure fair competition and efficient allocation but are often deployed on centralized infrastructure.<n>Public blockchains eliminate central control, yet their inherent transparency conflicts with the confidentiality required for sealed bidding.<n>We present a sealed-bid auction protocol that executes sensitive bidding logic on a confidential compute blockchain.
arXiv Detail & Related papers (2025-10-22T11:35:51Z) - Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography [30.57370996703948]
We argue that capable machine learning models can fulfill the role of a trusted third party.<n>This approach aims to achieve a balance between privacy and computational efficiency.<n>We show that even some simple classic cryptographic problems can already be solved with TCME.
arXiv Detail & Related papers (2025-01-15T17:28:53Z) - Private, Auditable, and Distributed Ledger for Financial Institutes [1.8911961520222993]
This paper proposes a framework for a private, audit-able, and distributed ledger (PADL) that adapts easily to fundamental use-cases within financial institutes.<n>PADL employs widely-used cryptography schemes combined with zero-knowledge proofs to propose a transaction scheme for a table' like ledger.<n>We show that PADL supports smooth-lined inter-assets auditing while preserving privacy of the participants.
arXiv Detail & Related papers (2025-01-07T14:21:24Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [43.253676241213626]
We propose an architecture for blockchain-based PAISs to preserve confidentiality and transparency.<n>Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.<n>We assess the security of our solution through a systematic threat model analysis and evaluate its practical feasibility.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - Provable Privacy with Non-Private Pre-Processing [56.770023668379615]
We propose a general framework to evaluate the additional privacy cost incurred by non-private data-dependent pre-processing algorithms.
Our framework establishes upper bounds on the overall privacy guarantees by utilising two new technical notions.
arXiv Detail & Related papers (2024-03-19T17:54:49Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Locally Differentially Private Embedding Models in Distributed Fraud
Prevention Systems [2.001149416674759]
We present a collaborative deep learning framework for fraud prevention, designed from a privacy standpoint, and awarded at the recent PETs Prize Challenges.
We leverage latent embedded representations of varied-length transaction sequences, along with local differential privacy, in order to construct a data release mechanism which can securely inform externally hosted fraud and anomaly detection models.
We assess our contribution on two distributed data sets donated by large payment networks, and demonstrate robustness to popular inference-time attacks, along with utility-privacy trade-offs analogous to published work in alternative application domains.
arXiv Detail & Related papers (2024-01-03T14:04:18Z) - Breaking the Communication-Privacy-Accuracy Tradeoff with
$f$-Differential Privacy [51.11280118806893]
We consider a federated data analytics problem in which a server coordinates the collaborative data analysis of multiple users with privacy concerns and limited communication capability.
We study the local differential privacy guarantees of discrete-valued mechanisms with finite output space through the lens of $f$-differential privacy (DP)
More specifically, we advance the existing literature by deriving tight $f$-DP guarantees for a variety of discrete-valued mechanisms.
arXiv Detail & Related papers (2023-02-19T16:58:53Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.