Computer Science ›› 2025, Vol. 52 ›› Issue (8): 385-392.doi: 10.11896/jsjkx.240600079

• Information Security • Previous Articles     Next Articles

Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain

FENG Yimeng1, FENG Yan1,2, XIE Sijiang1,2, ZHANG Qing1   

  1. 1 Cyberspace Security Department,Beijing Electronic Science and Technology Institute,Beijing 100070,China
    2 University of Science and Technology of China,Hefei 230026,China
  • Received:2024-06-12 Revised:2024-09-11 Online:2025-08-15 Published:2025-08-08
  • About author:FENG Yimeng,born in 2000,postgra-duate.Her main research interests include cyberspace security and blockchain.
    FENG Yan,born in 1979,postgraduate,associate professor.Her main research interests include cryptography,network security,and quantum communication network security system.
  • Supported by:
    Innovation Program for Quantum Science and Technology(2021ZD0300705) and Fundamental Research Funds for the Cental Universitles(32820230057Z0114).

Abstract: Aiming at the situation that blockchain transaction mapping analysis may leak users' privacy and the third-party mi-xing service providers are not trustworthy,this paper proposes an agent-based bidirectional mixing protocol PBShuffle without the need of a third party.The protocol process does not require the participation of a third-party mixing service provider,and it adopts the method of delivering the output address to the aggregated users through an agent.The agent is randomly selected by the participant among all participants and needs to perform two rounds of mixing to deliver output addresses to two aggregated users respectively.The protocol utilizes double encryption to achieve privacy protection in the process of output address delivery,the agent can only decrypt the encrypted message encrypted with the public key of the aggregated user,and the aggregated user can only know that the message is delivered by the agent,and cannot derive the source participant of the message.The protocol is theoretically analyzed to be highly secure in terms of non-connectivity,verifiability and robustness.Comparison experiments with CoinShuffle show that PBShuffle has higher efficiency and lower overhead in the case of a larger number of participating users,and is more suitable for practical applications.

Key words: Blockchain, Privacy protection, Coin mixing mechanism, Encryption, Anonymit

CLC Number: 

  • TP309
[1]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System [EB/OL].(2008-11-01) [2024-05-29].http://bitcoin.org/bitcoin.pdf.
[2]LI X D,NIU Y K,WEI L B,et al.A Survey of Bitcoin Privacy Protection[J].Journal of Cryptologic Research,2019,6(2):133-149.
[3]BONNEAU J,NARAYANAN A,MILLER A,et al.Mixcoin:Anonymity for Bitcoin with Accountable Mixes [C]//Proceedings of the 18th International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:486-504.
[4]VALENTA L,ROWAN B.Blindcoin:Blinded,Accountable Mixes for Bitcoin [C]//Proceedings of the International Conference on Financial Cryptography and Data Security.Berlin:Springer,2015:112-126.
[5]HEILMAN E,ALSHENIBR L,BALDIMTSI F,et al.Tumble-Bit:An Untrusted Bitcoin-Compatible Anonymous Payment Hub [C]//Proceedings of the 24th Annual Network and Distributed System Security Symposium.2017:158-176.
[6]MAXWELL G.CoinSwap:Transaction Graph Disjoint Trustless Trading [EB/OL].(2013-10-30) [2024-05-29].https://bitcointalk.org/index.php?topic=321228.0.
[7]MAXWELL G.CoinJoin:Bitcoin Privacy for the Real World[EB/OL].(2013-08-22) [2024-05-29].https://bitcointalk.org/index.php?topic=279249.0.
[8]RUFFING T,MORENO P S,KATE A.CoinShuffle:Practical Decentralized Coin Mixing for Bitcoin [C]//Proceedings of the European Symposium on Research in Computer Security.Berlin:Springer,2014:345-364.
[9]ZIEGELDORF J H,GROSSMANN F,HENZE M,et al.CoinParty:Secure Multi-Party Mixing of Bitcoins [C]//Proceedings of the 5th ACM Conference on Data and Application Security and Privacy.New York:ACM,2015:75-86.
[10]HUANG Y Y,PU J.Learning Blockchain from Zero[M].Beijing:Tsinghua University Press,2020:122-128.
[11]NIEM H,OU Y Y.A Decentralized Obfuscation Scheme forDigital Currency with Customizable Amounts[J].Journal of Guangdong University of Technology,2021,38(1):64-68.
[12]CHENG Q L,JIN Y.TTShuffle:privacy protection mechanism based on two-tier shuffling in blockchain [J].Application Research of Computers,2021,38(2):363-366,371.
[13]SONG J H,LI Z K,ZHANG B C.Coin mixing mechanism inblockchain based on intermediator [J].Application Research of Computers,2022,39(3):868-873.
[1] DAI Xiangguang, HE Chenglong, GUAN Mingyu, ZHANG Wei, ZHOU Yang, LIU Jianfeng, LYU Qingguo. State-decomposition Distributed Dual Averaging Algorithm for Privacy Online ConstrainedOptimization over Directed Networks [J]. Computer Science, 2025, 52(8): 411-420.
[2] WANG Chundong, ZHANG Qinghua, FU Haoran. Federated Learning Privacy Protection Method Combining Dataset Distillation [J]. Computer Science, 2025, 52(6A): 240500132-7.
[3] ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8.
[4] LIU Runjun, XIAO Fengjun, HU Weitong, WANG Xu. Reversible Data Hiding in Fully Encrypted Images Based on Pixel Interval Partitioning andPrediction Recovery [J]. Computer Science, 2025, 52(6A): 240900030-8.
[5] YUAN Lin, HUANG Ling, HAO Kaile, ZHANG Jiawei, ZHU Mingrui, WANG Nannan, GAO Xinbo. Adversarial Face Privacy Protection Based on Makeup Style Patch Activation [J]. Computer Science, 2025, 52(6): 405-413.
[6] CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao. Survey of Personalized Location Privacy Protection Technologies [J]. Computer Science, 2025, 52(5): 307-321.
[7] WANG Qiuli, REN Zhiyu, WU Xiangyu, GUAN Qiuguo, WANG Haichao. Blockchain-based Internet of Things Traceable and Anonymous Cross-domain AuthenticationScheme [J]. Computer Science, 2025, 52(5): 337-344.
[8] TAN Shiyi, WANG Huaqun. Remote Dynamic Data Integrity Checking Scheme for Multi-cloud and Multi-replica [J]. Computer Science, 2025, 52(5): 345-356.
[9] WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374.
[10] ZHENG Xu, HUANG Xiangjie, YANG Yang. Reversible Facial Privacy Protection Method Based on “Invisible Masks” [J]. Computer Science, 2025, 52(5): 384-391.
[11] YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361.
[12] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
[13] DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365.
[14] LIU Yuming, DAI Yu, CHEN Gongping. Review of Federated Learning in Medical Image Processing [J]. Computer Science, 2025, 52(1): 183-193.
[15] LI Yongjun, ZHU Yuefei, BAI Lifang. Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [J]. Computer Science, 2024, 51(9): 393-400.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!