A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications

Let us consider a situation where someone wants to encrypt his/her will on an existing blockchain, e.g. Bitcoin, and allow an encrypted will to be decryptable only if designated members work together. At a first glance, such a property seems to be easily provided by using conventional threshold encr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Communications and Computer Sciences, 2020/01/01, Vol.E103.A(1), pp.150-164
Hauptverfasser: HANAOKA, Goichiro, SAKAI, Yusuke, SHIMIZU, Toshiya, SHIMOYAMA, Takeshi, SHIN, SeongHan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 164
container_issue 1
container_start_page 150
container_title IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
container_volume E103.A
creator HANAOKA, Goichiro
SAKAI, Yusuke
SHIMIZU, Toshiya
SHIMOYAMA, Takeshi
SHIN, SeongHan
description Let us consider a situation where someone wants to encrypt his/her will on an existing blockchain, e.g. Bitcoin, and allow an encrypted will to be decryptable only if designated members work together. At a first glance, such a property seems to be easily provided by using conventional threshold encryption. However, this idea cannot be straightforwardly implemented since key pairs for an encryption mechanism is additionally required. In this paper, we propose a new threshold encryption scheme in which key pairs for ECDSA that are already used in the Bitcoin protocol can be directly used as they are. Namely, a unique key pair can be simultaneously used for both ECDSA and our threshold encryption scheme without losing security. Furthermore, we implemented our scheme on the Bitcoin regtest network, and show that it is fairly practical. For example, the execution time of the encryption algorithm Enc (resp., the threshold decryption algorithm Dec) is 0.2sec. (resp., 0.3sec.), and the total time is just only 3sec. including all the cryptographic processes and network communications for a typical parameter setting. Also, we discuss several applications of our threshold encryption scheme in detail: Claiming priority of intellectual property, sealed-bid auction, lottery, and coin tossing service.
doi_str_mv 10.1587/transfun.2019CIP0018
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2331866157</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2331866157</sourcerecordid><originalsourceid>FETCH-LOGICAL-c470t-1ce8940508598b750d96139fb18b01799813da1c741d04af71bf2f58e9622cc93</originalsourceid><addsrcrecordid>eNpNkEFPwjAUxxujiYh-Aw9NPA_71m1tj5OAkpBIBL02Xde5kbHOthz49kIQ5PTe4ff7v5c_Qo9ARpBy9hyc6ny17UYxATGeLQgBfoUGwJI0AkrZNRoQAVnEU8Jv0Z336wMRQzJAXzlemrDto6kzBq9qZ3xt2xJPOu12fWhsh5e6NhuDK-twqA1-aYK2TYcXzgarbYtVV-JZ8Djv-7bR6uD4e3RTqdabh785RJ_TyWr8Fs3fX2fjfB7phJEQgTZcJGT_Vip4wVJSigyoqArgBQEmBAdaKtAsgZIkqmJQVHGVciOyONZa0CF6Oub2zv5sjQ9ybbeu25-UMaXAswxStqeSI6Wd9d6ZSvau2Si3k0DkoUF5alBeNLjXPo7a2gf1bc6ScqHRrfmXJkCozCWclouQM6xr5aTp6C_4pYKY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2331866157</pqid></control><display><type>article</type><title>A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications</title><source>J-STAGE (Japan Science &amp; Technology Information Aggregator, Electronic) Freely Available Titles - Japanese</source><creator>HANAOKA, Goichiro ; SAKAI, Yusuke ; SHIMIZU, Toshiya ; SHIMOYAMA, Takeshi ; SHIN, SeongHan</creator><creatorcontrib>HANAOKA, Goichiro ; SAKAI, Yusuke ; SHIMIZU, Toshiya ; SHIMOYAMA, Takeshi ; SHIN, SeongHan</creatorcontrib><description>Let us consider a situation where someone wants to encrypt his/her will on an existing blockchain, e.g. Bitcoin, and allow an encrypted will to be decryptable only if designated members work together. At a first glance, such a property seems to be easily provided by using conventional threshold encryption. However, this idea cannot be straightforwardly implemented since key pairs for an encryption mechanism is additionally required. In this paper, we propose a new threshold encryption scheme in which key pairs for ECDSA that are already used in the Bitcoin protocol can be directly used as they are. Namely, a unique key pair can be simultaneously used for both ECDSA and our threshold encryption scheme without losing security. Furthermore, we implemented our scheme on the Bitcoin regtest network, and show that it is fairly practical. For example, the execution time of the encryption algorithm Enc (resp., the threshold decryption algorithm Dec) is 0.2sec. (resp., 0.3sec.), and the total time is just only 3sec. including all the cryptographic processes and network communications for a typical parameter setting. Also, we discuss several applications of our threshold encryption scheme in detail: Claiming priority of intellectual property, sealed-bid auction, lottery, and coin tossing service.</description><identifier>ISSN: 0916-8508</identifier><identifier>EISSN: 1745-1337</identifier><identifier>DOI: 10.1587/transfun.2019CIP0018</identifier><language>eng</language><publisher>Tokyo: The Institute of Electronics, Information and Communication Engineers</publisher><subject>Algorithms ; Bitcoin ; Cryptography ; Data encryption ; Digital currencies ; ECDSA ; Encryption ; implementation ; provable security ; Security management ; threshold encryption</subject><ispartof>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020/01/01, Vol.E103.A(1), pp.150-164</ispartof><rights>2020 The Institute of Electronics, Information and Communication Engineers</rights><rights>Copyright Japan Science and Technology Agency 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c470t-1ce8940508598b750d96139fb18b01799813da1c741d04af71bf2f58e9622cc93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,1883,27924,27925</link.rule.ids></links><search><creatorcontrib>HANAOKA, Goichiro</creatorcontrib><creatorcontrib>SAKAI, Yusuke</creatorcontrib><creatorcontrib>SHIMIZU, Toshiya</creatorcontrib><creatorcontrib>SHIMOYAMA, Takeshi</creatorcontrib><creatorcontrib>SHIN, SeongHan</creatorcontrib><title>A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications</title><title>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</title><addtitle>IEICE Trans. Fundamentals</addtitle><description>Let us consider a situation where someone wants to encrypt his/her will on an existing blockchain, e.g. Bitcoin, and allow an encrypted will to be decryptable only if designated members work together. At a first glance, such a property seems to be easily provided by using conventional threshold encryption. However, this idea cannot be straightforwardly implemented since key pairs for an encryption mechanism is additionally required. In this paper, we propose a new threshold encryption scheme in which key pairs for ECDSA that are already used in the Bitcoin protocol can be directly used as they are. Namely, a unique key pair can be simultaneously used for both ECDSA and our threshold encryption scheme without losing security. Furthermore, we implemented our scheme on the Bitcoin regtest network, and show that it is fairly practical. For example, the execution time of the encryption algorithm Enc (resp., the threshold decryption algorithm Dec) is 0.2sec. (resp., 0.3sec.), and the total time is just only 3sec. including all the cryptographic processes and network communications for a typical parameter setting. Also, we discuss several applications of our threshold encryption scheme in detail: Claiming priority of intellectual property, sealed-bid auction, lottery, and coin tossing service.</description><subject>Algorithms</subject><subject>Bitcoin</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Digital currencies</subject><subject>ECDSA</subject><subject>Encryption</subject><subject>implementation</subject><subject>provable security</subject><subject>Security management</subject><subject>threshold encryption</subject><issn>0916-8508</issn><issn>1745-1337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNpNkEFPwjAUxxujiYh-Aw9NPA_71m1tj5OAkpBIBL02Xde5kbHOthz49kIQ5PTe4ff7v5c_Qo9ARpBy9hyc6ny17UYxATGeLQgBfoUGwJI0AkrZNRoQAVnEU8Jv0Z336wMRQzJAXzlemrDto6kzBq9qZ3xt2xJPOu12fWhsh5e6NhuDK-twqA1-aYK2TYcXzgarbYtVV-JZ8Djv-7bR6uD4e3RTqdabh785RJ_TyWr8Fs3fX2fjfB7phJEQgTZcJGT_Vip4wVJSigyoqArgBQEmBAdaKtAsgZIkqmJQVHGVciOyONZa0CF6Oub2zv5sjQ9ybbeu25-UMaXAswxStqeSI6Wd9d6ZSvau2Si3k0DkoUF5alBeNLjXPo7a2gf1bc6ScqHRrfmXJkCozCWclouQM6xr5aTp6C_4pYKY</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>HANAOKA, Goichiro</creator><creator>SAKAI, Yusuke</creator><creator>SHIMIZU, Toshiya</creator><creator>SHIMOYAMA, Takeshi</creator><creator>SHIN, SeongHan</creator><general>The Institute of Electronics, Information and Communication Engineers</general><general>Japan Science and Technology Agency</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20200101</creationdate><title>A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications</title><author>HANAOKA, Goichiro ; SAKAI, Yusuke ; SHIMIZU, Toshiya ; SHIMOYAMA, Takeshi ; SHIN, SeongHan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c470t-1ce8940508598b750d96139fb18b01799813da1c741d04af71bf2f58e9622cc93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Bitcoin</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Digital currencies</topic><topic>ECDSA</topic><topic>Encryption</topic><topic>implementation</topic><topic>provable security</topic><topic>Security management</topic><topic>threshold encryption</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>HANAOKA, Goichiro</creatorcontrib><creatorcontrib>SAKAI, Yusuke</creatorcontrib><creatorcontrib>SHIMIZU, Toshiya</creatorcontrib><creatorcontrib>SHIMOYAMA, Takeshi</creatorcontrib><creatorcontrib>SHIN, SeongHan</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>HANAOKA, Goichiro</au><au>SAKAI, Yusuke</au><au>SHIMIZU, Toshiya</au><au>SHIMOYAMA, Takeshi</au><au>SHIN, SeongHan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications</atitle><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle><addtitle>IEICE Trans. Fundamentals</addtitle><date>2020-01-01</date><risdate>2020</risdate><volume>E103.A</volume><issue>1</issue><spage>150</spage><epage>164</epage><pages>150-164</pages><issn>0916-8508</issn><eissn>1745-1337</eissn><abstract>Let us consider a situation where someone wants to encrypt his/her will on an existing blockchain, e.g. Bitcoin, and allow an encrypted will to be decryptable only if designated members work together. At a first glance, such a property seems to be easily provided by using conventional threshold encryption. However, this idea cannot be straightforwardly implemented since key pairs for an encryption mechanism is additionally required. In this paper, we propose a new threshold encryption scheme in which key pairs for ECDSA that are already used in the Bitcoin protocol can be directly used as they are. Namely, a unique key pair can be simultaneously used for both ECDSA and our threshold encryption scheme without losing security. Furthermore, we implemented our scheme on the Bitcoin regtest network, and show that it is fairly practical. For example, the execution time of the encryption algorithm Enc (resp., the threshold decryption algorithm Dec) is 0.2sec. (resp., 0.3sec.), and the total time is just only 3sec. including all the cryptographic processes and network communications for a typical parameter setting. Also, we discuss several applications of our threshold encryption scheme in detail: Claiming priority of intellectual property, sealed-bid auction, lottery, and coin tossing service.</abstract><cop>Tokyo</cop><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transfun.2019CIP0018</doi><tpages>15</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0916-8508
ispartof IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020/01/01, Vol.E103.A(1), pp.150-164
issn 0916-8508
1745-1337
language eng
recordid cdi_proquest_journals_2331866157
source J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese
subjects Algorithms
Bitcoin
Cryptography
Data encryption
Digital currencies
ECDSA
Encryption
implementation
provable security
Security management
threshold encryption
title A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T06%3A00%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Setup-Free%20Threshold%20Encryption%20Scheme%20for%20the%20Bitcoin%20Protocol%20and%20Its%20Applications&rft.jtitle=IEICE%20Transactions%20on%20Fundamentals%20of%20Electronics,%20Communications%20and%20Computer%20Sciences&rft.au=HANAOKA,%20Goichiro&rft.date=2020-01-01&rft.volume=E103.A&rft.issue=1&rft.spage=150&rft.epage=164&rft.pages=150-164&rft.issn=0916-8508&rft.eissn=1745-1337&rft_id=info:doi/10.1587/transfun.2019CIP0018&rft_dat=%3Cproquest_cross%3E2331866157%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2331866157&rft_id=info:pmid/&rfr_iscdi=true