Abstract
In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at ensuring secure blockchain transactions while minimizing both computational and communication overhead. During the transaction process, this approach utilizes certificateless public key signcryption without bilinear pairs to generate anonymous user identities, achieving strong anonymity of user identities and confidentiality of transaction amounts. It employs the Paillier homomorphic encryption algorithm to update transaction amounts and uses the FO commitment-based zero-knowledge proof scheme to validate transaction legality. Additionally, adopting a publicly verifiable secret threshold sharing scheme for hierarchical regulatory authority reduces the security risk of a single regulator storing the regulatory key. This model not only meets the privacy and timely update requirements of account-based blockchain transactions but also effectively regulates abnormal transactions. Rigorous security analysis and proofs demonstrate that this model possesses excellent anonymity, traceability, forward security, and backward security. When compared to similar schemes, the computational cost is reduced by at least 33.18%, effectively fulfilling the requirements for security.
1. Introduction
Since Satoshi Nakamoto proposed Bitcoin [] in 2008, blockchain technology, as its underlying architecture, has been widely applied in various fields such as financial services and the Internet of Things, thanks to its core features of decentralization, transparency, and immutability. However, the public transparency of blockchain also brings significant privacy risks. Research shows that approximately 67% of Bitcoin users can be de-anonymized through methods such as transaction graph analysis and IP address association, thereby exposing sensitive information such as their asset flows and consumption habits. Therefore, the protection of privacy in blockchain transactions has been a focal point of interest in both academia and industry.
Currently, blockchain transaction systems commonly use a model of public ledgers and multi-party confirmation to achieve a pseudo-anonymization of user identities. However, this mechanism has fundamental flaws, as attackers can break anonymity through techniques such as network analysis and address clustering. To enhance anonymity, scholars have proposed various anonymity-enhancing technologies, such as Zerocash [], Moreno [], and Dash []. However, while these technologies achieve complete anonymity of user identity information, they also hinder regulatory needs such as anti-money laundering (AML) and financial crime investigations, leading to transaction bans on privacy coins by regulatory agencies in multiple countries. Therefore, balancing anonymity and regulatory compliance in blockchain transactions has become an important research topic.
Currently, there are two main models for blockchain transactions: the Unspent Transaction Output (UTXO) model and the account model. In the UTXO model, asset movement is viewed as a directed acyclic graph between users, and a user’s balance is represented by the state of all UTXOs associated with them in the system. This means there is a one-to-many relationship between balance and address, as seen in Bitcoin. There has been a significant amount of research, both domestically and internationally, addressing the transaction privacy issues related to the UTXO model, primarily focusing on protecting the identity privacy of transaction users and the transaction amounts. The technologies employed include mixing techniques, ring signatures, vector commitments, and zero-knowledge proofs, aimed at achieving confidentiality and untraceability of transaction amounts.
In contrast, the account model maintains a global state of all accounts and their balances, which are updated in real time as transactions occur. This results in a one-to-one correspondence between each account balance and its address, as seen in Ethereum. Consequently, most privacy-preserving schemes designed for the UTXO model are not applicable to the account model. Existing research on account model privacy heavily relies on centralized regulatory authorities, which not only contradicts the principle of decentralization in blockchain but also poses risks of single point key leakage or abuse of power.
In response to the above issues, this paper proposes a supervised blockchain anonymous transaction model based on certificateless signcryption under the account model. By integrating certificate-free cryptography with a distributed regulatory mechanism, it achieves a balance between user privacy protection and transaction supervision. The main contributions are outlined below.
- (1)
- A supervised blockchain anonymous transaction model based on certificateless signcryption is proposed—CLSC_SAT. It not only achieves anonymity of transaction users and confidentiality of transaction amounts but also ensures the entire process is in compliance with regulations, thus striking a balance between transaction privacy protection and regulatory requirements.
- (2)
- A certificateless signcryption algorithm without bilinear pairing is designed to generate anonymous identities for transaction users and conceal transaction amounts, achieving strong anonymity for transaction users, reducing computational and communication overhead, and significantly improving signature efficiency. At the same time, the Paillier homomorphic encryption algorithm is used to verify transaction amounts, and zero-knowledge range proofs based on FO commitments are employed to validate the legitimacy of transaction amounts, ensuring the privacy of transaction content.
- (3)
- Implementation of a multi-party regulatory mechanism that achieves “comprehensive supervision and decentralized authority”. Introduction of a collaborative model with one primary regulator and n secondary regulators to ensure the decentralization and comprehensiveness of regulatory responsibilities. In the event of abnormal behavior during transactions, tracking of the true identity of the anomalous user; at the same time, adopt a publicly verifiable secret threshold sharing scheme for distributed storage of regulatory keys. This not only reduces the potential risk of misconduct associated with a single regulator holding the regulatory key but also effectively mitigates the risk of single points of failure, ensuring the security and compliance of the transaction process.
2. Related Work
2.1. Certificateless Signcryption Scheme
Certificateless signcryption is an important cryptographic primitive that combines certificateless encryption and certificateless signature. Compared with encryption before signature and signature before encryption, both communication modes have higher computational efficiency. In 2008, Barbosa et al. [] first proposed a certificateless signcryption scheme based on bilinear pairing, and, subsequently, a series of certificateless signcryption schemes were introduced. Zhu et al. [] first proposed a certificateless signature scheme without bilinear pairing and provided a security proof. Zhou et al. [] verified that the scheme in reference [] could not withstand Type I attacks and made improvements. Yue et al. [] reconstructed a certificateless signature scheme based on reference [], but it still did not satisfy the property of unforgeability. Yang et al. [] improved the scheme in reference [] and proved that the newly proposed scheme satisfies confidentiality and unforgeability in the random oracle model.
2.2. Privacy Protection Scheme Under Account Model
Guan et al. [] first proposed the privacy protection scheme BlockMaze under the account model based on zk-SNARKs, introducing a dual-balance model to hide the identities of the transaction parties. However, the scheme requires a trusted setup and has low throughput. Ma et al. [] proposed a decentralized smart contract system DSC with hiding and updating features based on homomorphic encryption and zero-knowledge proofs, using homomorphic encryption technology to conceal user account balances and transaction amounts, and proving the validity of transactions through non-interactive zero-knowledge proofs, but the transfer relationship between the sender and receiver remains exposed. Bünz et al. [] proposed a fully decentralized confidential payment mechanism and designed new smart contracts to achieve transaction privacy protection. Rondelet et al. [] implemented Zerocash on Ethereum using additional smart contracts, but the overall operation of the scheme is complex. Guo et al. [] achieved compatibility between blockchain regulatory compliance and anonymity through dual-layer signature authentication at the network and application layers. Bao et al. [] designed a scheme based on a check mechanism to hide the relationship between the transaction sender and receiver, employing confidential transactions to conceal account balances and transaction amounts, while supporting flexible auditing.
3. Preliminaries
3.1. Hard Problem Hypothesis
Elliptic Curve Discrete Logarithm Problem, ECDLP []: Let q be a large prime number, G an additive group of order q, and P a generator of the group G. Given , the goal is to solve for the specific value of a, where .
Computational Diffie–Hellman (CDH) [] problem: Let q be a large prime number, G an additive group of order q, and P a generator of the group G. Given , the goal is to solve for the specific value of , where .
3.2. Paillier Homomorphic Encryption
The Paillier homomorphic encryption algorithm was proposed by Pascal Paillier [] in 1999. It is an asymmetric encryption algorithm that allows for addition and multiplication operations to be performed directly on encrypted data without the need for decryption. It is based on the composite residuosity class problem’s homomorphic scheme. Paillier algorithm mainly includes three parts: key generation, encryption and decryption.
- (1)
- Key generation algorithm: Randomly select two large prime numbers p and q of equal length, and . Compute and , where represents the least common multiple. Randomly select the integer , where , , , , so that , the public key is , the private key is , where .
- (2)
- Encryption algorithm: Set plaintext to m, , select random numbers and , ciphertext is .
- (3)
- Decryption algorithm: Input the private key and ciphertext c, output .
The Paillier cryptosystem exhibits the following additive homomorphic properties:
The product of two ciphertexts encrypted with Paillier, when decrypted, yields the sum of the corresponding plaintexts. Given two ciphertexts , where , , the addition operation between ciphertexts is expressed as:
where , . The resulting ciphertext corresponds to the encryption of .
4. System and Security Models
4.1. Symbol Specification
The main symbols used in the CLSC_RAT model are explained in Table 1.
Table 1.
Symbol Description.
4.2. System Model
CLSC_SAT model mainly includes four participating entities: Key Generation Center (KGC), transaction user, miner, and regulators. The functions of each participating entity are as follows.
Key Generation Center (KGC): As a semi-trusted third party, it initializes the system with the regulatory authority, generates system public parameters and public and private key pairs, generates part of public/private key pairs for transaction users.
Transaction user: The main participants of the blockchain transaction system, including the transaction sender and the recipient, each user has an anonymous identity as an anonymous identity address, and a pair of transaction key pairs.
Miner: The entity is responsible for verifying the legality of transactions, packaging legal transactions into blocks and adding them to the blockchain, and maintaining the blockchain ledger.
Regulators: a semitrusted group with the functions of supervision and accountability. When abnormal transactions are found, it decrypts the ciphertext of the transaction, tracks the real identity of malicious users, and uploads the smart contract blacklist to prohibit them from initiating transactions again.
The CLSC_SAT model consists of nine probabilistic polynomial-time algorithms:
- (1)
- : The algorithm is invoked by the KGC and the main regulator MR. It takes a security parameter k as input and outputs the system master key s, the tracking key r, and the system public parameters PP. The KGC and MR secretly store s and r, respectively, and publicly share PP. In subsequent algorithms, PP is implicitly input.
- (2)
- : The algorithm is invoked by users and regulatory agencies, inputting PP, the user’s partially anonymous address , and the user identity index , and outputting the user’s anonymous identity address .
- (3)
- : The algorithm is invoked by the regulatory authority, inputting PP and outputting the regulatory key pair and the public key .
- (4)
- : The algorithm is invoked by the KGC. It inputs the user’s anonymous identity address and outputs the user’s partial public–private key pair .
- (5)
- : The algorithm is invoked by the transacting user. It inputs the user’s anonymous identity address and the partial public–private key pair , and outputs the user’s anonymous address key pair .
- (6)
- : The algorithm is invoked by the transaction sender. The inputs are PP, the anonymous account address of the transaction sender , the anonymous address key pair , the transaction amount , the anonymous account address of the transaction receiver , the public key of the transaction receiver , the supervised public key , and then output transaction information .
- (7)
- : The algorithm is invoked by blockchain miner nodes. When input transaction is received, the miner node verifies the legitimacy of the transaction. If the verification is successful, it outputs , and the miner node records the transaction on the blockchain using a consensus algorithm and broadcasts it; otherwise, it outputs and sends the transaction to the regulatory authority for auditing.
- (8)
- : The algorithm is invoked by the transaction recipient. It takes as input the recipient’s anonymous account address , the anonymous address key pair , the transaction , and the regulatory public key , and outputs the received transaction .
- (9)
- : The algorithm is invoked by regulatory authorities. When an abnormal transaction occurs, it inputs the PP, regulatory private key , and tracking key r, transaction information , and user anonymous verification list EIDList, and outputs the transaction amount and the true identity of the malicious user .
4.3. Security Model
Two categories of attackers are defined in certificateless cryptography: Type I attackers and Type II attackers . simulates an external attacker who can replace the user’s public key but cannot obtain the system’s master key; simulates an internal attacker with access to KGC’s master key, but cannot replace any user’s public key. The security model in this paper is primarily based on confidentiality under adaptive chosen ciphertext attacks (IND-CCA2) and unforgeability under adaptive chosen message attacks (EUF-CMA). The security of the scheme is formally verified through an interactive game framework involving a challenger C and adversaries and .
The adversary can query the following random oracles:
- Hash Query: The adversary can execute arbitrary hash function queries. The challenger C returns the corresponding hash value to the adversary.
- Partial Private Key Query: When the adversary requests a partial private key with an anonymous identity , the challenger C sends the partial private key to the adversary.
- Private Key Query: When the adversary requests a full private key with an anonymous identity , the challenger C sends the private key to the adversary.
- Public Key Query: When the adversary requests a public key with an anonymous identity , the challenger C sends the public key to the adversary.
- Public Key Replacement Query: Upon receiving a request to replace the public key of user , the challenger C replaces ’s public key with .
- Signcryption Query: When receiving a signcryption request for message m, the challenger C generates the signcrypted ciphertext by executing the signcryption algorithm and returns it to the adversary.
- Unsigncryption Query: When receiving a query for unsigncryption with the sender ’s public key, the receiver’s identity , and the signcrypted ciphertext , the challenger C retrieves ’s private key, executes the unsigncryption algorithm to recover the message m, and returns m to the adversary.
Definition 1 (Confidentiality).
Under the Random Oracle Model, if there are no adversaries that can achieve victory over Game 1 and Game 2 with a significant advantage within the PPT, then the CLSC_SAT model satisfies indistinguishability against adaptive chosen ciphertext attacks for certificateless signcryption (IND-CLSC-CCA2).
Game 1 (IND-CLSC-CCA2-G1). The challenger C interacts with adversary as follows:
- (1)
- Initialization: The challenger C takes a security parameter as input, runs the system initialization algorithm to generate the system master key s and public parameters PP. C sends PP to and keeps s secret.
- (2)
- Query Phase: adaptively issues queries to the oracles defined above, subject to the following constraints:
- cannot request a partial private key query for the receiver .
- If the receiver’s public key has been replaced, cannot request a private key query for .
- cannot request an unsigncryption query for the challenge ciphertext .
- (3)
- Challenge Phase: submits two equal-length distinct messages , a sender identity , and a receiver identity . The challenger C randomly selects , computes the signcrypted ciphertext , and returns to .
- (4)
- Guessing Stage: outputs a guess . If , wins the game. The advantage of is defined as:
Game 2 (IND-CLSC-CCA2-G2). The challenger C interacts with adversary as follows:
- (1)
- Initialization: C executes the system initialization algorithm to generate the system master key s and public parameters PP. C sends both PP and s to .
- (2)
- Query Phase: adaptively issues queries to the oracles except private key queries and public key replacement queries, under the constraints:
- cannot request a private key query for the receiver .
- cannot request an unsigncryption query for the challenge ciphertext .
- (3)
- Challenge Phase: Same as in Game 1.
- (4)
- Guess Phase: outputs a guess . If , wins the game. The advantage of is defined analogously as:
Definition 2 (Unforgeability).
Under the Random Oracle Model (ROM), if no adversary can achieve a non-negligible advantage in winning Game 3 and Game 4 within probabilistic polynomial time (PPT), then the CLSC_SAT model satisfies existential unforgeability of certificateless signcryption under chosen message attack (EUF—CLSC—CMA).
Game 3 (EUF—CLSC—CMA-G3): The challenger C interacts with adversary as follows:
- (1)
- Initialization: adaptively executes the same initialization phase as in Game 1.
- (2)
- Query Phase: adaptively performs the above oracle query if the following conditions are met.
- cannot request a signcryption query for the tuple .
- If the sender ’s public key has been replaced, AI cannot request a partial private key query for .
- cannot request a private key query for the sender .
- (3)
- Forgery Phase: outputs a forged signcryption for message m. If there is no output , the signature is legal and wins this game. The advantage of is defined as:where denotes the probability that successfully forges a valid signcryption under security parameter k.
Game 4 (EUF—CLSC—CMA-G4): The challenger C interacts with adversary as follows:
- (1)
- Initialization: adaptively executes the same initialization phase as in Game 2.
- (2)
- Query Phase: adaptively performs the above oracle query if the following conditions are met.
- cannot request a signcryption query for the tuple .
- cannot request a private key query for the sender .
- (3)
- Forgery Phase: outputs a forged signcryption for message m. If there is no output , the signature is legal and wins this game. The advantage of is defined as:where denotes the probability that successfully forges a valid signcryption under security parameter k.
5. Concrete Scheme
5.1. Specific Transaction Process
Taking the example of Alice paying a transaction amount to Bob, before the transaction, the local account balances of Alice and Bob are and , respectively. After the transaction, Alice’s local account balance is updated to , and Bob’s local account balance is updated to . To protect account privacy, the account balances of Alice and Bob are stored on the blockchain using Paillier homomorphic encryption, i.e., and . The transaction model is shown in Figure 1.
Figure 1.
Transaction model.
(1) : Algorithm 1 is invoked by the KGC and MR. Given the security parameter , select an elliptic curve addition cyclic group of order q, with P as the generator of . The KGC randomly selects as the system master private key and computes as the system master public key. The MR randomly selects as the tracing key and computes as the tracing public key. The KGC and MR select five hash functions: , , , , . The KGC publishes , where the system master private key is secretly kept by the KGC, and is secretly kept by the MR.
| Algorithm 1. System initialization algorithm. |
| Input: |
| Output: , , |
| 1. KGC selects an elliptic curve addition cyclic group of order q, with P as the generator of . |
| 2. KGC selects as the primary private key. |
| 3. Calculate as the system’s main public key. |
| 4. MR Selects as the tracking key. |
| 5. Calculate as the tracking public key. |
| 6. KGC and MR Jointly define hash function: |
| 7. KGC discloses security parameters: |
| 8. KGC Keeps s in secret. |
| 9. MR Keeps r in secret. |
(2) : Algorithm 2 is invoked by the transaction user and the regulatory authority. The transaction user randomly selects , computes the partial anonymous identity , and the identity index . The user then sends to MR. Subsequently, MR computes to retrieve the real identity of the transaction user, computes the partial anonymous identity , and generates the transaction user’s anonymous identity address , where represents the validity period of the anonymous identity. Send to KGC.
Simultaneously, MR establishes a user anonymous identity traceability table EIDList, storing the user’s anonymous identity identifier and identity index .
Alice and Bob randomly select and , respectively, compute and . MR then computes their respective anonymous identity addresses, and .
| Algorithm 2. User registration and anonymous identity address generation algorithm. |
| Input: PP, , |
| Output: |
| 1. Transaction user randomly selectes . |
| 2. Calculate . |
| 3. Calculate . |
| 4. Send to MR. |
| 5. MR calculates and . |
| 6. Generate anonymous address of transaction user . |
| 7. Send to KGC. |
| 8. MR Creates the user anonymous identity tracing table EIDList. |
(3) : Algorithm 3 is invoked by the regulatory authority. The authority randomly selects two large primes and , computes , and . A parameter g is chosen from , where is defined as the multiplicative group of integers modulo (see Section 3.2 for details). The parameter g must satisfy , where the function is defined in Section 3.2. The regulatory authority generates the regulatory public key and the regulatory private key , and publishes .
| Algorithm 3. Supervised key generation algorithm. |
| Input: PP |
| Output: , |
| 1. The regulator chooses two large prime numbers and . |
| 2. Calculate . |
| 3. Calculate . |
| 4. Choose the parameter g from so that it satisfies . |
| 5. Generate the supervisory public key and the supervisory private key . |
| 6. Disclose the public key of supervision . |
(4) : Algorithm 4 is invoked by the KGC. The KGC randomly selects , computes , and calculates the transaction user’s partial private key , where . Subsequently, the KGC sends and to the user through a secure channel.
The KGC generates partial key pairs and for Alice and Bob, respectively.
| Algorithm 4. User partial key generation algorithm. |
| Input: PP, , |
| Output: |
| 1. KGC randomly selectes . |
| 2. Calculate . |
| 3. Calculate . |
| 4. Calculate |
| 5. Send , to MR. |
(5) : Algorithm 5 is invoked by Alice and Bob separately. First, the user receives , computes , and checks whether the equation holds. If it holds, the user accepts ; otherwise, the user requests a new partial private key from the KGC. Subsequently, the user randomly selects , computes , and generates the complete key pair.
Alice and Bob, following the above method, select and respectively, compute and , and obtain their complete key pairs: , .
| Algorithm 5. User key generation algorithm. |
| Input: PP, |
| Output: , |
| 1. Calculate . |
| 2. Calculate . |
| 3. User randomly selectes . |
| 4. Calculate . |
| 5. Generate . |
| 6. Generate . |
(6) : Algorithm 6 is invoked by Alice. The transaction amount is encrypted using two methods: one is Paillier homomorphic encryption for transaction verification, where Alice randomly selects an integer and uses the regulatory public key to compute ; the other is certificateless signcryption for transaction updates, where Alice randomly selects , computes , , with , computes , with , and computes , with . The signature for is generated, and the transaction is sent on the blockchain. Additionally, Alice makes a commitment and proves to the miner nodes through a commitment proof that the encrypted amount is always positive.
| Algorithm 6. Transaction creation algorithm. |
| Input: PP, , , , , , , |
| Output: |
| 1. Sender randomly selectes . |
| 2. Calculate . |
| 3. Sender selectes . |
| 4. Calculate . |
| 5. Calculate . |
| 6. Calculate . |
| 7. Calculate . |
| 8. Calculate . |
| 9. Calculate . |
| 10. Calculate . |
| 11. Generate a signature . |
| 12. Send the transaction . |
(7) : Algorithm 7 is invoked by the miner nodes and Alice. The miner nodes verify the correctness of and the signature σ. The correctness of σ is verified by checking whether the equation holds. If it holds, is considered valid and legitimate, and the output is . The miner nodes then use a consensus algorithm to add the transaction record to the blockchain and broadcast it. Otherwise, the output is , and the transaction is sent to the regulatory authority for auditing.
The correctness of is proved as follows:
Lemma 1.
For , the equation holds.
For any given base and , is invertible modulo n, and obtain
In the above equation, given , computing is computationally hard. However, if is known, it is possible to compute any .
The correctness of is proved as follows:
| Algorithm 7. Transaction verification algorithm. |
| Input: PP, |
| Output: |
| 1. Calculate to verify the correctness of . |
| 2. Calculate . |
(8) : Algorithm 8 is invoked by the miner nodes and Bob, respectively. The miner nodes utilize the additive property of Paillier homomorphic encryption to update Bob’s ledger balance in ciphertext as:
Simultaneously, Bob uses his private key to compute , and , updating his local account balance to . The algorithm outputs the received transaction .
The correctness of the transaction amount is shown below:
| Algorithm 8. Transaction update algorithm. |
| Input: PP, , , , , |
| Output: |
| 1. Calculate . |
| 2. Calculate . |
| 3. Calculate . |
| 4. Calculate . |
| 5. Update the balance to . |
| 6. Accept transaction . |
(9) : Algorithm 9 is invoked by the regulatory authority. In the event of anomalous transactions, no fewer than t subordinate regulators () recover the private key and compute the transaction amount . Simultaneously, the MR retrieves the malicious user’s identity address , queries the anonymous identity traceability table EIDList, and computes or to recover the malicious user’s real identity .
| Algorithm 9. Transaction tracing algorithm. |
| Input: PP, , , , EIDList, |
| Output: , |
| 1. restores the supervised private key . |
| 2. Calculate . |
| 3. MR acquires . |
| 4. Query EIDList. |
| 5. Calculate or . |
5.2. Transaction Verification
Considering the differences in transaction fee mechanisms across various blockchain platforms, this scheme temporarily excludes the execution costs associated with Ethereum and disregards processing fees. CLSC_SAT verifies the legality of transactions from two perspectives: First, it conducts a verification, ensuring that the sum of the transferred amount and the remaining account balance equals the original account balance. Second, it performs a legitimacy verification, confirming that the amount transferred is between 0 and the total account balance.
For the verification of the transaction amount being “sufficient”, the additive property of the Paillier algorithm is used. After the transaction, Alice and Bob’s account balances are updated to and , respectively, by checking whether the following two equations are equal:
If the equations are equal, then the transaction amount is “sufficient” for successful verification.
The legality of the transaction is verified using the zero-knowledge range proof method based on FO commitments mentioned in reference [], which will not be elaborated on here.
5.3. Transaction Supervision
The regulatory content of blockchain transactions encompasses transaction amounts and the authentic identity information of users. The CLSC_SAT model employs a multi-party collaboration framework for transaction supervision, where a primary regulator (MR) and n secondary regulators () jointly oversee the entire transaction process to ensure transparency and compliance of all transactional data. The MR possesses a tracking key r and collaborates with to maintain the regulatory key through a threshold secret sharing scheme, enabling supervision of transaction content and identity tracing. The MR generates the regulatory key and distributes it to n by splitting into fragments using a publicly verifiable threshold secret sharing scheme. During transactions, no single regulator, including the MR, can independently recover the key or conduct abnormal behavior tracing. The key distribution protocol is as follows:
- (a)
- Supervision Key Distribution
The MR selects a t − 1 degree polynomial over , sets , and distributes the shared secret to . The threshold value is t, satisfying . The MR computes and broadcasts the commitment .
- (b)
- Supervision Key Verification
Each verifies the validity of the received share by checking whether . If the equality fails, the share is deemed invalid.
- (c)
- Supervision Key Recovery
When an abnormal transaction occurs, MR initiates a key recovery request to ensure that no less than t secondary regulator is involved. When the shared of all participating is verified as valid, uses the Lagrange polynomial interpolation method to calculate to obtain .
When an abnormal transaction is detected, the main regulator (MR) initiates a key recovery request. No less than t recovers the regulatory key through the above process and calculates the transaction transfer amount:
Simultaneously, the MR retrieves the malicious user’s and from the user anonymous identity traceability table EIDList (see Table 2). The MR uses the tracking private key to compute or to recover the malicious user’s real identity . This information is then uploaded to the smart contract to protect the legitimate rights and interests of other users. The supervision and tracing process is illustrated in Figure 2.
Table 2.
User anonymous identity tracing list.
Figure 2.
Process of supervision and tracing.
6. Scheme Analysis and Proof
6.1. Security Analysis
- (1)
- Anonymity: In the CLSC_SAT model, the real identity of a user can be traced in two ways. The first method is , where the user’s anonymous identity is composed of a secret value chosen by the user and the tracking key . Only entities possessing or can compute . This process is equivalent to solving the CDH hard problem, i.e., given and , solving , which is computationally infeasible. The second method is . Since only the MR possesses , other nodes cannot recover using this method. Additionally, is not stored in the EIDList. Even if an attacker A obtains from the EIDList, they cannot reveal the user’s real identity without solving the CDH problem or stealing the tracking private key . Therefore, the CLSC_SAT model satisfies anonymity.
- (2)
- Traceability: When signature verification fails or a miner node detects an anomalous transaction, the user’s is traced and revealed. The MR retrieves the anonymous identity of the user involved in the anomalous transaction and uses the tracking key to compute or to recover . The malicious user’s is then disclosed. Thus, the CLSC_SAT model satisfies traceability.
- (3)
- Forward and Backward Security: In the CLSC_SAT model, even if an adversary A obtains the signature information , where , and , the randomness of and ensures that each transaction’s signature is unique. It is impossible to infer the content of previously or subsequently sent messages using the current transaction’s signature information. Therefore, the CLSC_SAT model satisfies forward and backward security.
6.2. Security Proof
Suppose a probabilistic polynomial-time (PPT) adversary can perform queries to (for i = 1,2,3,4), partial private key queries, private key queries, and signature queries.
(1) Confidentiality
The proof of confidentiality is based on the Computational Diffie–Hellman (CDH) problem.
Theorem 1.
Under the Random Oracle Model (ROM), if the Computational Diffie–Hellman (CDH) problem is intractable within polynomial time, then the proposed CLSC_SAT model is indistinguishable against Type I and Type II adversaries.
Theorem 1 is proven through Lemmas 2 and 3.
Lemma 2.
Under the ROM, if an adversary has a non-negligible advantage against the security of the proposed scheme under IND-CLSC-CCA2-G1 game, then there exists a challenger C that can solve the CDH hard problem in probabilistic polynomial time.
Proof.
Suppose that an adversary could break the IND-CLSC-CCA2-G1 security of proposed CLSC_SAT scheme. Assume that C is a solver for the CDH problem. Given a CDH problem instance , compute through interaction with .
The challenger C selects an identity as the challenge identity and maintains the lists: record queries and responses for hash functions . records user creation list. records partial private key queries. records private key queries. records signcryption queries. All lists are initially empty. The interaction between AI and C proceeds as follows.
- (1)
- Initialization Phase: C runs the initialization algorithm and sends the system public parameters to . C computes and secretly stores the master private key s.
- (2)
- Query Phase: Phase I. performs the following polynomial queries.User Creation: The challenger C maintains an initially empty list . When queries an identity , C first checks whether exists in . If it exists, C returns the public key of to AI. If does not exist and , C randomly selects , computes , , and , while . If , C randomly selects , computes , , and . Finally, C sends the public key to and appends to .
- Query: queries with identity for . C checks the list. If is in , C sends it to . Otherwise, C randomly selects , returns it to , and saves in the list.
- Query: AI queries with identity for . C checks the list. If is in , C sends it to AI. Otherwise, C randomly selects , returns it to , and saves in the list.
- Query: queries with identity for . C checks the list. If is in , C sends it to AI. Othe rwise, C randomly selects , returns it to AI, and saves in the list.
- Query: queries with identity for . C checks the list. If is in , C sends it to AI. Otherwise, C randomly selects , returns it to , and saves in the list.
- Partial Private Key Query: C maintains a list . When queries with identity , if , C terminates the simulation. Otherwise, C searches for the corresponding in the list . If it exists, C returns to . If it does not exist, C randomly selects , computes , , and . C then sends to and saves in the list.
- Private Key Query: C maintains a list . When queries with identity , C searches for the corresponding in the . If it exists, C returns to . If it does not exist, C randomly selects , computes , performs a partial private key query, saves in , and sends to AI.
- Public Key Query: C maintains a list . When queries with identity , C searches for the corresponding in the . If it exists, C returns to . If it does not exist, C performs a partial private key query, saves in , and sends to .
- Public Key Replacement Query: When queries with , if , C terminates the simulation. Otherwise, C finds and replaces it with .
- Signcryption Query: When AI queries with for signcryption, if , C retrieves and from and , where . C chooses , sets and computes , , . Then returns to .If , C retrieves from respectively, and obtains from . C randomly selects , computes , , , and . C generates the signature and returns to .
- Unsigncryption Query: When the adversary issues an unsigncryption query for . If , C retrieves the tuples from and from . C verifies the signature and computes . Then sends to . If , C executes the actual unsigncryption algorithm. Then C decrypts the ciphertext and returns to .
- (3)
- Challenge Phase: selects two transaction messages of equal length and a pair of identities , where is the sender identity and is the receiver identity. If , C aborts the game. If , C randomly selects and performs the following steps:
- C retrieves ’s public key from .
- Sets , where is an instance of the CDH problem.
- Computes , where .
- Randomly selects and computes and .
- C obtains private keys via private key queries and computes .
- C sends to .
Phase II. As same in Phase I, asks a series of questions that continue to interact with Challenger C, but cannot issue private key queries for , nor can it issue unsigncryption queries on .
- (4)
- Guessing Phase: If can break the IND-CLSC-CCA2-G1 security of the scheme, it must have queried for the tuple . If outputs a valid , the challenger C extracts the solution to the CDH problem , where and .
□
Lemma 3.
Under the ROM, if an adversary has a non-negligible advantage against the security of the proposed scheme under IND-CLSC-CCA2-G2 game, then there exists a challenger C that can solve the CDH hard problem in probabilistic polynomial time.
Proof.
Suppose that an adversary could break the IND-CLSC-CCA2-G2 security of proposed CLSC_SAT scheme. Assume that C is a solver for the CDH problem. Given a CDH problem instance , compute through interaction with .
The challenger C selects an identity as the challenge identity and maintains the same lists as in GAME1. All lists are initially empty. The interaction between and C proceeds as follows.
- (1)
- Initialization Phase: The challenger C runs the initialization algorithm and sends and the master key s to the adversary , computing .
- (2)
- Query Phase: Phase I. performs the following polynomial queries.User Creation: The challenger C maintains an initially empty list . When queries an identity , C first checks whether exists in . If it exists, C returns the public key of to . If does not exist, C randomly selects , computes , and sets . If , C randomly selects , computes and . If , C sets , . Finally, C sends the public key to and appends to .
- : Same as Lemma 2.
- Partial Private Key Query: C maintains a list . When queries with identity , if , C terminates the simulation. Otherwise, C searches for the corresponding in the list . If it exists, C returns to . If it does not exist, C randomly selects , computes , and . C then sends to and saves in the list.
- Private Key Query: Same as GAME1.
- Public Key Query: C maintains a list . When executes t query with identity , C searches the list for the corresponding . If finds, C returns to . Otherwise, if , C randomly selects , computes , , and sets . Then sends to . And stores in , stores in . If , C randomly selects , computes , and sets . Then sends to . And stores in , stores in .
- Public Key Replacement Query: When queries with , if , C terminates the simulation. Otherwise, C finds and replaces it with .
- Signcryption Query: Same as Lemma 2.
- Unsigncryption Query: Same as Lemma 2.
- Challenge Phase: Same as Lemma 2.
Phase II. As same in Phase I, asks a series of questions that continue to interact with Challenger C, but cannot issue a private key query for the receiver , nor can it issue unsigncryption queries on .
- (3)
- Guess Phase: If can break the IND-CLSC-CCA2-G2 security of the scheme, it must have queried for the tuple . If AI outputs a valid , the challenger C extracts the solution to the CDH problem , where .
□
(2) Unforgeability
Theorem 2.
Under the ROM, if the Elliptic Curve Discrete Logarithm Problem (ECDLP) is hard to solve in polynomial time, then the proposed CLSC_SAT model is unforgeable against adaptive chosen message attacks for both Type I and Type II adversaries.
Theorem 2 is proven through Lemmas 4 and 5.
Lemma 4.
Under the ROM, if an adversary has a non-negligible advantage against the security of the proposed scheme under EUF—CLSC—CMA-G3 game. Then there exists a challenger C that can solve the ECDLP hard problem in probabilistic polynomial time.
Proof.
Suppose that an adversary could break the EUF—CLSC—CMA-G3 security of proposed CLSC_SAT scheme. Assume that C is a solver for the ECDLP problem. Given a ECDLP problem instance , compute s through interaction with .
- (1)
- Initialization Phase: Same as Lemma 2.
- (2)
- Query Phase: Same as Lemma 2.
- (3)
- Forgery Phase: outputs a forged signature message . If , then C terminates the simulation. Otherwise, C recovers from respectively, computes . According to the forking lemma [], within PPT, AI choose another and can obtain another valid signature , computes . Subtracting the two equations yields . Thus, , and C outputs s as the solution to the given ECDLP instance.
□
Lemma 5.
Under the ROM, if an adversary has a non-negligible advantage against the security of the proposed scheme under EUF—CLSC—CMA-G4 game. Then there exists a challenger C that can solve the ECDLP hard problem in probabilistic polynomial time.
Proof.
Suppose that an adversary could break the EUF—CLSC—CMA-G4 security of proposed CLSC_SAT scheme. Assume that C is a solver for the ECDLP problem. Given a ECDLP problem instance , compute x through interaction with . In this phase, let .
- (1)
- Initialization Phase: Same as lemma 3.
- (2)
- Query Phase: Same as lemma 3.
- (3)
- Forgery Phase: outputs a forged signature message . If , then C terminates the simulation. Otherwise, C recovers from respectively, computes . According to the forking lemma, within PPT, AII choose another and can obtain another valid signature , computes . Subtracting the two equations yields . Thus, , and C outputs x as the solution to the given ECDLP instance.
□
7. Experimental Analysis
7.1. Experimental Simulation
The feasibility verification of the CLSC_SAT model was conducted on a server running Ubuntu 20.04, equipped with an Intel i5-10210U 1.60 GHz CPU and 8 GB RAM. The model’s nine algorithms (Setup, CreateAddr, CreateRkey, SetPartialKey, SetPub/PrivKey, CreateTx, VerifyTx, RenewalTx, TraceTx) were implemented using the PBC library and C programming language. Each algorithm was executed 1000 times, and the average execution times are presented in Table 3.
Table 3.
Time consumption of algorithms in CLSC_SAT.
To further validate the feasibility of the model, the total transmission time, signature time, and verification time were tested for transaction volumes of 20, 40, 60, 80 and 100 in the account model, as shown in Figure 3. The experimental results indicate that as the number of transactions increases, the total transmission time grows linearly, aligning with the expected data transmission performance of the CLSC_SAT model under large-scale transactions. Additionally, the signature time is higher than the verification time, which is attributed to the greater complexity of the signature algorithm.
Figure 3.
Time in different transactions under the account model.
This paper also analyzes the performance of CLSC_SAT model in terms of computing overhead and communication overhead.
7.2. Computational Overhead Analysis
In this study, a bilinear pairing was selected to achieve an 80-bit security level. Here, is a supersingular elliptic curve defined over the finite field with the equation , where is a 512-bit large prime number and is a 160-bit large prime number. For the elliptic curve scheme, an elliptic curve was chosen, with . The execution time of cryptographic operations was calculated using the C language under the PBC library, with each operation executed 1000 times. The average time consumption for each operation is presented in Table 4.
Table 4.
Average runtime for cryptographic operations in PBC library.
To evaluate the computational complexity, the computational overhead of the signature and verification algorithms in the CLSC_SAT model was compared with that of reference [,,,,], focusing on the time consumption for signing and verifying signatures, as shown in Table 5. The results indicate that the CLSC_SAT model performs better in terms of computational cost. The signing algorithm time of reference [] is close to that of the CLSC_SAT model, but its verification algorithm time is approximately three times that of the CLSC_SAT model. The signing and verification algorithm times of reference [] are the same but are higher than those of the CLSC_SAT model. Reference [], based on bilinear pairing operations, has the highest time consumption for both signing and verification algorithms. Although the verification algorithm time of reference [] is the same as that of the CLSC_SAT model, its signing time is approximately three times that of the CLSC_SAT model. The signing and verification algorithm times of reference [] are almost identical, but all of them are higher than the CLSC_SAT model. Therefore, the CLSC_SAT model improves signing efficiency by 33.18%, 45.29%, 33.22% and 33.5% compared to references [,,,], respectively, and improves verification efficiency by 66.81%, 66.64%, 94.29%, and 66.88% compared to references [,,,,], respectively. The experiments demonstrate that the CLSC_SAT model achieves higher signing and verification efficiency while protecting identity privacy compared to other schemes.
Table 5.
Comparison of computational costs.
The calculation cost of CLSC_SAT model with references [,,,,] signature and verification is shown in Figure 4.
Figure 4.
Comparison of signature generation and verification time [,,,,].
7.3. Communication Overhead Analysis
The communication overhead of the CLSC_SAT model is primarily analyzed based on the size of the elements required for signature transmission, including the anonymous identity , public key , signature , and timestamp . In the elliptic curve constructed in this paper, the sizes of and are 64 bytes and 20 bytes, respectively. Therefore, elements in and occupy 128 bytes and 40 bytes, respectively. Assuming that elements in occupy 20 bytes and the timestamp occupies 4 bytes, the space occupied by different types of data elements is shown in Table 6.
Table 6.
Different types of elements occupy the space size.
To compare the commonalities of various schemes, this paper focuses solely on the size of the signatures. A comparison of communication overhead with the literature is presented in Table 7. It can be observed that the signature overhead in this study is the lowest, and the transmission overhead is only higher than that of reference [].
Table 7.
Comparison of communication cost.
In the CLSC_SAT model, , where occupies bytes, occupies bytes, occupies bytes, and occupies bytes. Therefore, the total transmission signature overhead is bytes. Similarly, taking references [,] as examples, in reference [], , where occupies bytes, occupies bytes, occupies bytes, and occupies bytes. Thus, the total transmission signature communication overhead is bytes. In reference [], , where occupies bytes, occupies bytes, occupies bytes, and occupies bytes. Therefore, the total transmission signature overhead is bytes. A comparison of communication overhead between this work and references [,,,] is illustrated in Figure 5.
Figure 5.
Comparison of communication cost [,,,].
7.4. Security Requirement Analysis
The CLSC_SAT model is compared with other blockchain privacy protection schemes in terms of functions, including transaction model, anonymity [], transaction amount protection and controllability, etc. The specific results are shown in Table 8. The results show that the CLSC_SAT model can meet more security requirements.
Table 8.
Performance comparison of different privacy protection schemes.
8. Conclusions
In order to study the issues of transaction privacy protection and regulation in a blockchain account model, this paper designs a supervised anonymous transaction model based on a certificateless public key signcryption algorithm, which does not require bilinear pairing. While achieving transaction privacy protection, it supports identity accountability and decentralized regulatory authority, ensuring the transparency and security of transactions. In terms of anonymity, the model generates user anonymous transaction identifiers through a certificateless signcryption algorithm without bilinear pairing, ensuring strong anonymity of user identities. It also uses the signcryption algorithm along with the Paillier homomorphic encryption algorithm to encrypt transaction amounts separately, ensuring the confidentiality of transactions and verifying them. For regulation, a publicly verifiable secret threshold sharing scheme is adopted to decentralize regulatory authority, thereby reducing the risks of single points of failure and power abuse associated with a single regulator storing the regulatory key. The CLSC_SAT model demonstrates superior performance in terms of anonymity, traceability, forward security, and backward security, while also achieving high signing efficiency and low communication overhead, making it suitable for blockchain transaction systems under account models. Future work will focus on exploring the feasibility of the proposed model in electronic voting scenarios, integrating it into mainstream blockchain platforms (e.g., Ethereum), and incorporating cryptographic accumulator techniques to optimize the efficiency of transaction history verification, thereby advancing the practical deployment of blockchain-based privacy-preserving technologies.
Author Contributions
Conceptualization, W.J.; methodology, W.J. and J.D.; software, J.D.; formal analysis, W.J.; writing—original draft, J.D. and H.Z.; writing—review & editing, W.J., J.D. and H.Z.; project administration, W.J. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by National Key R&D Program of China, grant number 2022YFB2703000.
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 2008, 21, 260. [Google Scholar]
- Sasson, E.B.; Chiesa, A.; Garman, C.; Green, M.; Miers, I.; Tromer, E.; Virza, M. Zerocash: Decentralized Anonymous Payments from Bitcoin. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 18–21 May 2014; pp. 459–474. [Google Scholar]
- Li, Y.; Yang, G.; Susilo, W.; Yu, Y.; Au, M.H.; Liu, D. Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secure Comput. 2019, 18, 679–691. [Google Scholar] [CrossRef]
- Duffield, E.; Diaz, D. Dash: A Privacy-Centric Cryptocurrency. Comput. Sci. 2015. [Google Scholar]
- Barbosa, M.; Farshim, P. Certificateless Signcryption. In Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 18–20 March 2008; pp. 369–372. [Google Scholar]
- Zhu, H.; Li, H.; Wang, Y.M. Certificateless Signcryption Scheme Without Pairing. Comput. Res. Dev. 2010, 47, 1587–1594. [Google Scholar]
- Zhou, Y.W.; Yang, B.; Zhang, W.Z. Secure Certificateless Signcryption Scheme Without Bilinear Pairing. J. Comput. Sci. 2016, 39, 1257–1266. [Google Scholar]
- Yue, Z.L.; Wang, D.; Mao, J.L. Improved Certificateless Signcryption Scheme Without Bilinear Pairing. J. Shandong Univ. 2020, 55, 51–57. [Google Scholar]
- Yang, X.D.; Li, M.J.; Wang, Z.S.; Chen, A.J.; Li, K.B. Security Analysis and Improvement of a Certificateless Signcryption Scheme. J. Shandong Univ. 2022, 57, 15–24. [Google Scholar]
- Guan, Z.; Wan, Z.; Yang, Y.; Zhou, Y.; Huang, B. BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs. IEEE Trans. Dependable Secure Comput. 2020, 19, 1446–1463. [Google Scholar] [CrossRef]
- Ma, S.; Deng, Y.; He, D.; Zhang, J.; Xie, X. An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain. IEEE Trans. Dependable Secure Comput. 2020, 18, 641–651. [Google Scholar] [CrossRef]
- Bünz, B.; Agrawal, S.; Zamani, M.; Boneh, D. Zether: Towards Privacy in a Smart Contract World. In Proceedings of the International Conference on Financial Cryptography and Data Security, Kota Kinabalu, Malaysia, 10–14 February 2020; pp. 423–443. [Google Scholar]
- Rondelet, A.; Zajac, M. ZETH: On Integrating Zerocash on Ethereum. arXiv 2019, arXiv:1904.00905. [Google Scholar]
- Guo, Y.N.; Jiang, W.B.; Ye, S. Supervisable Blockchain Anonymous Transaction System Model. J. Comput. Appl. 2022, 42, 2757–2764. [Google Scholar]
- Bao, Z.; He, D.; Wei, W.; Peng, C.; Huang, X. Ledgermaze: An Efficient Privacy-Preserving Non-Interactive Zero-Knowledge Scheme Over Account-Model Blockchain. IEEE Trans. Comput. 2023, 72, 3489–3502. [Google Scholar]
- Koblitz, N. Elliptic Curve Cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
- Boneh, D.; Boyen, X. Short Signatures Without Random Oracles. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; pp. 56–73. [Google Scholar]
- Paillier, P. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–9 May 1999; pp. 223–238. [Google Scholar]
- Li, J.Z. Application Research on Privacy Protection of Blockchain Transaction Based on Paillier Homomorphic Encryption. Master’s Thesis, Southeast University, Nanjing, China, 2019. [Google Scholar]
- Pointcheval, D.; Stern, J. Security Arguments for Digital Signatures and Blind Signatures. J. Cryptol. 2000, 13, 361–369. [Google Scholar] [CrossRef]
- Guo, R.; Hu, G.L.; Wang, J.M. An Anonymous Certificateless Aggregate Signature Schema in VANETs. Comput. Eng. 2024, 50, 207–222. [Google Scholar]
- Liu, X.Y.; Wang, L.; Huan, L.J.; Du, X.; Niu, S. Certificateless Anonymous Authentication Scheme for Internet of Vehicles. J. Electron. Inf. Technol. 2022, 44, 295–304. [Google Scholar]
- Zhong, H.; Han, S.S.; Cui, J.; Zhang, J.; Xu, Y. Privacy-Preserving Authentication Scheme with Full Aggregation in VANET. Inf. Sci. 2019, 476, 211–221. [Google Scholar] [CrossRef]
- Zhang, B. A Lightweight Data Aggregation Protocol with Privacy-Preserving for Healthcare Wireless Sensor Networks. IEEE Syst. J. 2020, 15, 1705–1716. [Google Scholar]
- Tomar, A.; Tripathi, S. BCSoM: Blockchain-Based Certificateless Aggregate Signcryption Scheme for Internet of Medical Things. Comput. Commun. 2023, 212, 48–62. [Google Scholar]
- Zhang, J.H.; Dong, C.H.; Liu, Y.N. Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT. IEEE Internet Things J. 2024, 11, 4348–4361. [Google Scholar] [CrossRef]
- Xue, Z.; Wang, M.; Zhang, Q.; Zhang, Y.; Liu, P. A Regulatable Blockchain Transaction Model with Privacy Protection. Int. J. Comput. Intell. Syst. 2021, 14, 1642–1652. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).