Increasing Anonymity in Bitcoin
Increasing Anonymity in Bitcoin
Increasing Anonymity in Bitcoin
1KGmoGJZfGXFZHU9bKjQmaphYJy8wVVEeh
Abstract. Bitcoin is a peer-to-peer cryptocurrency that prevents double spending using a distributed
public ledger (known as the blockchain). Due to this, true anonymity is not present in Bitcoin because
funds can be traced as they pass via dierent addresses. It is sometimes possible to link various addresses
and obtain information not apparent in the beginning (such as loops). We present a method to enhance
the anonymity of Bitcoin-type cryptocurrencies. Our method uses a new primitive known as one-way
aggregate signature (OWAS). The anonymity in our scheme is based on the hardness of the computation
Die-Hellman assumption in bilinear maps and the knapsack problem. At a high level, the idea is based
on mixing funds and can be summarized as follows. In the blockchain, each individual block holds
a list of transactions that cryptographically link the sending and receiving addresses. We modify the
protocol so that transactions (and blocks) do not contain any links between sending and receiving
address. Using this, we obtain a far higher degree of anonymity than what is currently oered. We use
two techniques to unlink the input and output addresses of a transaction - using OWAS and applying
the knapsack problem to further obfuscate the funds going in and out.
Keywords: Bitcoin, cryptocurrency, aggregate signatures, knapsack, anonymity
1 Introduction
Bitcoin (symbol ) is a cryptocurrency based on peer-to-peer technology. It uses no central authority and
allows instant fund transfers across the globe without needing any intermediary [1, 2]. Bitcoin enables trans-
action conrmation (to prevent double spending) using a reward system. The rst transaction of every block
is a reward (currently 25) to whoever rst provides a solution to hard puzzle as a proof-of-work. The
puzzle is constructed from unconrmed transactions and the proof-of-work serves as a distributed, tamper
proof ledger.
In Bitcoin, funds are exchanged between addresses which are hashes of public keys
1
The addresses serve
as pseudonyms and provide some anonymity. However, Bitcoin raises serious privacy concerns because all the
information is public and permanently stored. Furthermore, digital signatures used in transactions provide
cryptographic proofs of funds transfer.
Our contribution: We propose a method to enhance the anonymity of Bitcoin using a new primitive known
as one-way aggregate signature (OWAS). Our method removes any cryptographic proofs of funds transfer.
The links between inputs and outputs are obfuscated because using OWAS, multiple transactions can be
grouped together into a larger transaction such that no links between the inputs and outputs of the original
transactions remain. The knapsack problem [3] is used for additional anonymity. Our anonymity comes in
the form of plausible deniability [4] (you may have done it but we cannot be sure).
Overview of one-way aggregate signatures: In aggregate signatures [5] many individual signatures can be
combined into and replaced with one short object - the aggregate signature. They were proposed to increase
eciency in verifying multiple signatures in applications such as routing protocols. However, the aggregate
signatures of [5] have another useful property that is not captured (and not needed) in standard denitions
such as in [5]. The property is that the aggregation process is one-way - given just the aggregate signature, it is
very hard to compute the individual signatures. This was used to construct veriably encrypted signatures [5].
OWAS dene this one-way property in a more general sense.
l
i=1
y
i
n
i=1
x
i
2. Each ref
i
for 1 i n was never used in any prior transaction.
The ordering of the signatures in tx is determined from the ordering of messages inside M (which is xed
due to the signatures).
Referencing outputs: In future, when spending the funds from any of the outputs (say B
i
y
i
) of the above
transaction, a reference ref
Biyi
to that output needs to be provided. Let tx be the string of Eqn. 1. Then
ref
Biyi
def
= (Hash(tx), i)
Because ref is constructed from the hash of a previous transaction, it is guaranteed that two dierent
transactions are distinct unless the outputs, input and ref are identical (a forbidden scenario). Due to
this, it is also guaranteed (with high probability) that the refs generated by using hashes of two dierent
transactions are also dierent. In fact, this is how Bitcoin prevents double spending (see below). A ref can
be used in a transaction at most once. Bitcoin clients maintain a list of unused refs to do this check.
Unspent outputs (and double-spends): An unspent output is essentially an unused reference, one that has
never been used in any transaction. The protocol design guarantees that references to two dierent outputs
will be distinct (see above). Each client maintains a set called unspent outputs. Each output of every
transaction is added to this set, and removed when is it used as a reference in another transaction. A
transaction with a reference not in this list is considered a double spend and is not processed.
3
Validating Transactions: A new transaction is valid if all the references are unused. If so, the transaction is
accepted as valid but unconrmed, and is relayed on the network. The clients add each such transaction to
a pool of unconrmed transactions. Unconrmed transactions can be double-spent.
Conrming Transactions: A miner is a client who conrms new transactions by solving a hard puzzle
and providing the solution as a proof-of-work as follows:
1. A bunch of unconrmed transactions along with one reward transaction (known as the coinbase trans-
action) are combined into a block.
2. Hash of the previous block h
pr
is added to the block.
3. A nonce is added to the block.
4. Hash(b) of the nal block b is computed.
If the output of the hash contains (at least) a specied number of leading zeros, the puzzle is solved,
otherwise the miner tries with dierent nonces until the puzzle is solved or some other miner broadcasts the
solution of a puzzle for a block referencing h
pr
. A correct solution implies that the corresponding block is
mined and all transactions contained in it are conrmed.
Conrmations: The number of conrmations of a transaction are the number of blocks in the blockchain
that have been accepted by the network since the block that includes the transaction. The possibility of
double-spending a transaction decreases exponentially with the number of conrmations.
Transaction pool management: Each client maintains a pool of unveried (but valid) transactions. An element
is removed from this pool when that transaction gets included in a mined block. This ensures that even if a
transaction is not included in an immediate block, it is kept in the pool until it gets mined. This guarantees
that once a transaction has been included in the pool of at least one miner, it will eventually be veried.
2
Anonymity: Transactions are not anonymous; since each input public-key signs the entire transaction,
some information is inherently leaked:
1. Each output is linked to the inputs via the signatures.
2. Each input is also linked to the previous output via the ref.
3. The inputs themselves are linked together (they belong to the same wallet).
4 Increasing Anonymity
It is possible to link outputs to inputs, which causes loss of anonymity. We describe here a modied protocol
that removes these links. Our protocol uses two primitives: (1) One-Way Aggregate Signatures, and (2) The
knapsack problem [20].
The intuition for anonymity is that because inputs and outputs in a transaction are cryptographically
unlinked, a miner and other intermediaries can dilute the information contained in a transaction by inserting
more information before processing it further. The nal mined block will have the input-output links in each
individual transaction highly obfuscated. The only information will be the set of inputs and outputs of an
entire block without any particular linkages within them.
2
The word pool as used here should not be confused with mining pool. They are unrelated terms.
4
One-way Aggregate Signatures (OWAS). The symbol
X
(m) denotes a signature on message m under
public key X. Dene OWAS roughly as follows:
1. Aggregation: A number of individual signatures
X1
(m
1
),
X2
(m
2
), . . . ,
Xn
(m
n
) can be combined into
a compact aggregate signature
({X1,X2,...,Xn})
(m
1
, m
2
, . . . , m
n
), using which we can be convinced
that each m
i
was signed under public key X
i
.
The aggregate signature is said to be on the set (m
1
, X
1
), (m
2
, X
2
), . . . (m
n
, X
n
).
2. Incremental aggregation: More signatures can be added to the aggregate signature at any time.
3. One-way: It is computationally hard to obtain any sub-aggregate signature given just the aggregate
signature. Informally, given the aggregate signature on a set S = (m
1
, X
1
), (m
2
, X
2
), . . . (m
n
, X
n
) of
(message, public-key) pairs, it is hard to compute the aggregate signature on any subset S
S.
4. No ordering: The aggregate signature does not maintain order - given an aggregate signature, it is
impossible to decide if it was computed all at once or incrementally.
OWAS are formally dened in Section 5.
A modied protocol Consider the message from the original protocol:
M
def
= (A
1
ref1
x
1
, A
2
ref2
x
2
, . . . , A
n
refn
x
n
, B
1
y
1
, B
2
y
2
, . . . , B
l
y
l
),
M is a combination of messages m
1
, m
2
, . . . , m
n
, m
1
, m
2
, . . . , m
l
, where:
m
i
def
= (A
i
refi
x
i
) (1 i n) [Inputs]
m
i
def
= (B
i
y
i
) (1 i l) [Outputs]
Transactions: Instead of dening a transaction as in Eqn. 1 (repeated below):
tx
def
= (M,
A1
(M),
A2
(M), . . . ,
An
(M)),
we dene it using OWAS as follows::
tx
def
= (M,
({A1,A2,...,An,A1,A2,...,A
l
})
(m
1
, m
2
, . . . , m
n
, m
1
, m
2
, . . . , m
l
)), (2)
such that each A
i
is a randomly generated public key, called a masking key, and the pairs (A
i
, m
i
) are
unique. Dene
def
= A
1
, A
2
, . . . A
n
, A
1
, A
2
, . . . A
l
and
def
= m
1
, m
2
, . . . m
n
, m
1
, m
2
, . . . m
l
. Equivalently,
tx
def
= (,
()
()).
Observe that in the above transaction, unlike the original Bitcoin protocol, each regular public key signs
a message containing exactly one input. It is never used for sign messages containing any output or other
inputs. Consequently, the signatures do not undeniably link the sending addresses to the receiving addresses
or other sending addresses. The one-way property of OWAS preserves the security of the original protocol; it
is infeasible to isolate any signatures spending funds from the inputs. Later on, we describe techniques that
exploit these facts to enhance anonymity of transactions.
Conrming a transaction: A transaction tx is valid if each of the inputs has an unused reference to a
previous output. Conrmation of tx requires a miner to solve a puzzle for a block containing that transaction,
constructed as follows:
1. A number of unconrmed transactions tx
1
, tx
2
, . . . tx
b
def
=
(c12...)
(
c
1
2
. . .
)
(c) Assume some canonical ordering of all inputs and outputs. Dene
b
def
=
c
1
2
. . .
,
where the elements of
b
are arranged in the canonical order.
(d) The nal mined block b is computed as:
b
def
= (h
pr
,
b
,
b
,
b
),
where
b
is a nonce s.t. Hash(b) has a certain number of leading zeros.
Referencing the outputs: In this modied protocol, we dont reference simply the outputs, but rather the
(masking-key, output) pairs. Let (A
j
, m
j
) be some (masking-key, output) pair in one of transactions included
in the above block. Recall that such a pair is unique in a block (even if the output may be repeated). We
compute a reference to the above pair as:
ref
(Aj,mj)
def
= (Hash(b), Hash(A
j
, m
j
))
Since the reference contains the hash of the block, an output can only be spent if its transaction has been
included in a mined block. This makes the new transaction incompatible with services that allow spending
from unconrmed transactions (such as satoshidice.com). However, this also makes the protocol more robust
to DoS attacks. To summarize, in the modied protocol, it is not possible to spend from unconrmed
transactions.
Security: OWAS provide security against two distinct types of forgery. The rst type, called ordinary forgery
is the one that all conventional signature schemes are expected to satisfy. This involves forging a signature
under an input public-key to steal funds. The second one, called extraction forgery occurs when two signatures
can be separated given the aggregation. This will also allow an attacker to steal funds.
3
Since OWAS do
not allow extraction of any sub-aggregate signatures, peers can only add further signatures to a transaction.
Double spending and replay attacks are prevented in a manner similar to the original protocol. We maintain
a list of unused refs, and reject the transaction that contains a ref that has been used. We justify that the
references are unique as follows:
1. The reference is a hash of the block and the (masking-key, output) pair.
2. Each block is unique because it contains a hash of the previous block.
3. The (masking-key, output) pairs in a block are unique.
We additionally consider the case where the sender uses a weak or compromised masking key. This is
similar to a double spending attack. The receiver should not trust the transaction until it is conrmed.
Anonymity: First observe that each input and output is cryptographically linked to only one public key (the
regular key or a masking key). Therefore given a transaction as in Eqn 2, it is impossible to prove that the
signer knew any outputs. Furthermore, signatures from many transactions can be aggregated to obfuscate
the input-output relationships (we discuss this below). Additionally, once a transaction is conrmed in a
block, it is removed from memory and only the conrmed block is stored. The block alone does not leak any
information about the input-output links. Consequently, if the individual transactions are not saved, this
information is eventually erased with time.
3
If an attacker can extract signatures, he can isolate the input and add any output.
6
Enhancing Anonymity: We give some techniques to enhance anonymity via plausible deniability.
Joiners: To further enhance anonymity, we propose the notion of joiners as follows. The senders will leave
a certain amount of funds free for their peers (this is additional to the transaction fee). This transaction is
called partial and the free funds are the joining bonus. Peers receiving any transaction with free funds can
add their addresses as outputs and claim the joining bonus to make the transaction full. The joining bonus
is not specically marked to make it indistinguishable from normal funds. Given a full transaction, it should
not be possible to distinguish which outputs consume the joining bonus.
Even with access to the individual transactions, it would still be impossible to prove with certainty that
the sender indeed sent those funds to some given output, since it is possible that the outputs were added
later on by a joiner. To ensure that transaction fees dont get consumed by joiners, a special output can be
used for transaction fees. To prevent a ood of full transactions from dierent joiners for the same partial
transaction, a spender/peer should broadcast a partial transaction to only to one peer. Once the transaction
is full, it will be broadcast to the network. Clients attempting to disrupt the network by broadcasting partial
transaction will be handled as explained below in the section on transaction pool management.
Merging services: A merging service accepts various transactions from clients and once sucient of them
are obtained, it merges them by aggregating the signatures before broadcasting to the network. Clients
attempting to disrupt the network by sending the same transactions to multiple merging services will be
handled in a similar way as for joiners.
The Knapsack problem: Note that given a merged or joined transaction, it may still be possible to deduce
some input-output relationships by analyzing the amount of funds going in and out. We use the knapsack
problem to hide this information. The knapsack problem [3, 21, 20] can be described as follows. Given a
positive rational number X and a set W of positive rational numbers w
1
, w
2
, ...w
n
, nd a subset S of W (if
it exists) whose elements sum to X. This problem is known to be NP-Hard (given sucient size of W). The
hardness of the problem can be additionally used to increase anonymity as follows. The recipient generates
a number of addresses to receive funds into. The sender randomly splits the funds into those addresses
and broadcasts the transaction. Other joiners or merging services may add further transactions to it, also
generated via the knapsack problem. Given a block of several such transactions, nding the input-output
linkages in that block is a hard problem. Note that the knapsack problem is pseudo-polynomial time; that
is, the complexity is O(nW). However, we observe that the knapsack instances can be generated such that
there are multiple solutions, giving plausible deniability.
Transaction pool management: Referring to the joiner protocol above, suppose a malicious peer trans-
mits a partial transaction tx = A to j joiners, where A is a set of inputs and outputs. This will result in
multiple full transactions AB
1
, AB
2
, . . . AB
j
, one for each joiner. Since an output can only be used once,
only one of these transactions will be accepted. In such a situation, a peer will reject all new transactions,
while a miner could pick one that maximizes fees.
5 One-Way Aggregate Signatures (OWAS)
Our modied protocol uses a primitive called OWAS, which we describe here.
Message-descriptor: A message-descriptor is a set (m
1
, pk
1
), (m
2
, pk
2
),. . . , (m
n
, pk
n
) of (message, public-
key) pairs.
Algorithms. An OWAS scheme has four algorithms:
1. KeyGen(K) The algorithm takes in a security parameter K and outputs a (public-private) key pair
pk, sk.
7
2. Sign(sk, m) The algorithm takes in a private key sk and a message m. It outputs a single-key signature
. This single-key signature is equivalent to an aggregate signature on the single pair (m, pk)
3. Aggregate((
1
,
1
), (
2
,
2
)) The algorithm takes in two (message-descriptor, signature) pairs. If both
signatures are valid and
1
2
= , it outputs an aggregate signature on the message-descriptor
1
2
,
otherwise it outputs an error symbol . Validity is checked by the Verify algorithm below.
4. Verify(, ) The algorithm takes in a message descriptor
= (m
1
, pk
1
), (m
2
, pk
2
), . . . , (m
n
, pk
n
),
and , a purported aggregate signature on . If the messages in are not unique, the algorithm outputs
Invalid. Otherwise it invokes a deterministic poly-time procedure and outputs either Valid or Invalid.
Security Security is dened using the following interaction with a forger A.
1. Setup: A chooses n. We generate n (public-private) keypairs (pk
i
, sk
i
)
i[1..n]
with security parameter
K. We give the set PK = pk
i
i[1..n]
to A.
2. Queries: A makes up to sign queries. Each sign query i consists of
i
, a message-descriptor with public
keys from PK. If the pairs in
i
are unique, we respond with an aggregate signature on
i
, otherwise we
return the error symbol . Let L be the set of message-descriptors in all sign queries.
3. Output: A outputs (
A
,
A
), a purported (message-descriptor, signature) pair possibly containing public
keys not from PK. Let PK
A
= pk[(m, pk)
A
. A wins if the following conditions hold:
(a) Verify(
A
,
A
) = Valid.
(b) The set PK PK
A
is non-empty.
(c)
A
is not signable (Def. 1 below).
Notation: Let
A
= (m, pk)[(m, pk)
A
pk PK. Assign a unique prime number to each element of
the set (m, pk)[((m, pk) L) (m, pk)
A
. Then each L corresponds to a unique integer
integer() obtained by multiplying the primes corresponding to its constituent (m, pk) pairs. Let Z be the
set integer()[ L. Let z
A
= integer(
A
), obtained by multiplying the primes corresponding to
A
.
Denition 1 (Signable Set) The set
A
is signable i there exists a solution in non-negative integers
x
i
to the equation z
A
=
ziZ
z
xi
i
.
In a weaker notion, we allow integer solutions. We call this weakly signable.
Example. Suppose L =
1
,
2
,
3
, with
1
= (m
1
, pk
1
), (m
2
, pk
2
),
2
= (m
2
, pk
2
), (m
3
, pk
3
) and
3
= (m
3
, pk
3
), (m
4
, pk
4
). Let
A
= (m
1
, pk
1
), (m
4
, pk
4
). Let us assign the primes as: (m
1
, pk
1
)
2, (m
2
, pk
2
) 3, (m
3
, pk
3
) 5, (m
4
, pk
4
) 7. We have Z = 6, 15, 35 and z
A
= 14. Then
A
is weakly
signable because 14 = 6 15
1
35. However,
A
is not signable since there are no solutions in non-negative
integers to 14 = 6
x1
15
x2
35
x3
.
Observe that the signable sets form a monoid under the signature aggregation operation, while the weakly
signable sets form a group. The signable sets are exactly those sets that can be generated by aggregating
the collected signatures using this operation.
Denition 2 An OWAS scheme KeyGen, Sign, Aggregate, Verify is secure if for sucently large K, there
is no probabilistic poly-time A that wins with non-negligible advantage in K.
Intuition: In the above denition, aggregation of signatures is represented by multiplication of the primes.
The game captures the fact that it is possible to generate new signatures by aggregating smaller signatures
(represented by signable numbers - obtained by multiplying elements of Z). Furthermore, it may additionally
be possible to generate new signatures by reversing the aggregation algorithm when only one input is
unknown (represented by weakly signable numbers - obtained by multiplying and dividing elements of Z).
8
Construction. Our OWAS construction is derived from the aggregate signatures of [5] by appending the
public key and a random string to the message.
Bilinear pairing: Let G
1
and G
2
be two cyclic multiplicative groups both of prime order q. A bilinear pairing
is a map e : G
1
G
1
G
2
satisfying:
Bilinearity: e(a
x
, b
y
) = e(a, b)
xy
a, b G
1
and x, y Z
q
.
Non-degeneracy: If g is a generator of G
1
then e(g, g) is a generator of G
2
.
Computability: The map e is eciently computable.
We require a case where the discrete logarithm problem in G
1
is believed to be hard. Such bilinear
pairings are known to exist (see [5]). Our security depends on the hardness of the following problem in G
1
:
Computation Die-Hellman (CDH) problem: Given g
x
, g
y
for a generator g of G
1
and unknowns x, y Z
q
,
compute g
xy
.
Algorithms: Select a security parameter . Let e : G
1
G
1
G
2
be a bilinear map over groups (G
1
, G
2
) of
prime order q, and g be a generator of G
1
. Denote by the alphabet 0, 1. Let H :
G
1
G
1
be a cryptographic hash function. These parameters are public.
1. KeyGen: The private key is x
R
Z
q
and the public key is pk = g
x
G
1
.
2. Sign: To sign a message m under the above public key pk, generate r
R
) as:
= (H(m, r, pk)
x
, r)
3. Aggregate: Two (message-descriptor, signature) pairs, (
1
,
1
), (
2
,
2
) are given. Ensure that Verify(
1
1
)
= Verify(
2
,
2
) = valid and
1
2
= . Then parse
1
and
2
as (
1
, R
1
) and (
2
, R
2
) respectively
and compute the aggregate signature on
1
2
as = (
2
, R
1
R
2
).
4. Verify(, ): Here = (m
1
, pk
1
), (m
2
, pk
2
), . . . , (m
k
, pk
k
) is a message-descriptor of length k and is
a purported aggregate signature on . To verify , rst ensure that all pairs are distinct. Then parse
as (
, r
1
, r
2
, . . . , r
k
) G
1
(
)
k
and check that the following holds:
e(
, g)
?
=
k
i=1
e(H(m
i
, r
i
, pk
i
), pk
i
)
Verication works because:
LHS = e(
k
i=1
i
, g) = e(
n
i=1
H(m
i
, r
i
, pk
i
)
xi
, g) =
n
i=1
e(H(m
i
, r
i
, pk
i
), g
xi
) = RHS
Security: Security is based on the hardness of the CDH problem (Theorem 1).
Theorem 1. Let H be a random oracle and let be the probability of an attacker breaking the OWAS scheme
after making at most sign queries and at most queries to H, such that the forgery contains at most
keys. Then we can solve the CDH problem in G
1
with probability
3
1
+1
2
n
.
The proof of Theorem 1 is given in Appendix A.
9
6 Using OWAS in Cryptocurrencies
As discussed earlier, OWAS can be used to enhance anonymity in cryptocurrencies (such as Bitcoin) by
unlinking the input and output addresses from where funds move. We summarize the ideas below.
In Bitcoin transactions, the sending addresses (i.e., public keys) are linked to the other sending addresses
and receiving addresses in a transaction. This link is hard in the sense that it provides a cryptographic
proof of funds transfer between those addresses. For example, suppose owner of address pk
1
wants to transfer
1 bitcoin to address pk
2
. The transaction will be the message Take 1 Bitcoin from pk
1
; Put 1 Bitcoin
in pk
2
, signed under the public key pk
1
. This transaction cryptographically links the addresses pk
1
and
pk
2
. The owner of pk
1
cannot later deny sending the funds to pk
2
.
Using OWAS, we can increase the anonymity signicantly by removing all linkages from the sending and
receiving addresses. This is possible because the aggregation process in OWAS is one-way. That is, once
aggregated, the the individual signatures cannot be recovered. This allows senders to sign messages releasing
funds without mentioning the receiving addresses or other sending addresses. Using OWAS, the transaction
in the above example will consist of two messages (1) the message Take 1 Bitcoin from pk
1
signed
under pk
1
, and (2) the message Put 1 Bitcoin in pk
2
signed under a randomly generated public key
(which we call the masking key). The two signatures will then be combined into one aggregate signature and
broadcast to the network. Other peers may add more signatures from their transactions before broadcasting
further (to increase unlinkability). Since individual signatures in an OWAS cannot be extracted, the above
aggregate signature serves as a secure record of the transaction, despite the fact that messages do not contain
references to other public keys. When presented with a transaction, senders can claim plausible deniability,
since the OWAS does not serve as a cryptographic proof of knowledge of the receiving addresses.
We additionally proposed the use of joiners, merging services and the knapsack problem [21] to further
obfuscate the input-output linkages in a block. If multiple transactions are generated via the knapsack
problem and combined together, it is a hard to infer the input-output relations if there are multiple solutions
to the resulting knapsack.
7 Integrating with Bitcoin
OWAS implementation: The modied transactions described here use OWAS instead of ordinary signa-
tures (such as ECDSA). The construction of OWAS presented here uses bilinear pairings on elliptic curves.
Cryptography based on such bilinear pairings is called Pairing-Based Cryptography (PBC) [2224]. Any
eciently computable bilinear pairing where the Die-Hellman problem is believed to be hard is suitable
for our OWAS construction. Currently several such pairings are known, such as the Weil pairing [25, 26], the
Tate-Lichtenbaum pairing [27], the Eta Pairing [28] and the Ate pairing [29]. Libraries for PBC are available
in C [30] and Java [31, 32].
Eciency: Public keys are elements of G
1
, which are elements of a suitable nite eld. Based on [33, 34], such
elements can be represented in about 30 bytes for 128 bits of security. The signatures constitute one group
element and n -bit strings (the random rs). The size of signatures increases linearly. Below we consider
the possibility of using a weaker scheme where these rs are removed. Signature verication requires several
pairing computations, which can be performed fairly eciently [33, 34] (< 10 ms on a Pentium).
Increasing eciency: Our OWAS construction extends the aggregate signature construction of [5] by con-
verting it into a probabilistic scheme using a random string r in the signature. The signatures of [5] are
constant-size (about 30 bytes) because the r is not included. However, they do not satisfy OWAS security
of Def. 2. In practice, however, a weaker security notion is sucient. In the weaker notion we require the
forgery
A
to be not weakly signable (Def. 1). We posit that the construction of [5] is secure in this weaker
sense. Furthermore, for our application, an even weaker form of security - the non-adaptive case - should be
sucient. This requires the adversary to output a forgery after making only one sign query. The signatures
of [5] satisfy this model [6]. Therefore, we envisage the construction of [5] to be used in our application.
10
Based on above parameters, transaction size is comparable to that in the existing protocol. In order
to verify transactions/blocks created via OWAS, all relevant masking keys need to be available. These can
either be part of the payload or kept in a publicly searchable database (with hashes as payloads).
It is possible for our modied protocol to co-exist with the current protocol. We simply add the new
type of transaction output based on OWAS. These types of outputs can be mixed with standard outputs.
An OWAS-based output will be spent using the new protocol described here. A transaction can even be
constructed using a mix of these outputs. We leave the engineering details for a future article.
8 Conclusion and Future Work
Bitcoin is a popular peer-to-peer cryptocurrency with a weak form of anonymity. We presented an enhance-
ment of the Bitcoin protocol to increase anonymity. Our method is based on a new cryptographic primitive
known as One-Way Aggregate Signatures (OWAS). OWAS are an extension of Boneh et al.s aggregate
signatures [5] and have the property that multiple signatures can be aggregated into one signatures such
that once aggregated, the individual signatures cannot be recovered. We gave the security model of OWAS
and presented a construction with a security proof under the random oracle model and the computational
Die-Hellman assumption in bilinear maps. We also presented a weaker notion of OWAS (using the weakly
signable set - Def. 1), which may be interesting because the publicly computable signatures exhibit a group
structure.
OWAS can be used to enhance anonymity in cryptocurrencies such as bitcoin by unlinking the input
and output addresses from where funds move. Current implementation of Bitcoin requires that the sending
addresses (i.e., public keys) are linked to the other sending addresses and receiving addresses in a transaction.
This link is hard in the sense that it provides a cryptographic proof of funds transfer between those addresses.
We use OWAS to remove all linkages from the sending and receiving addresses. This enables senders to sign
messages releasing funds without mentioning the receiving addresses or other sending addresses, thereby
providing plausible deniability. Additionally, several transactions can be combined into one large transaction
(possibly via the knapsack problem) in order to further obfuscate the links.
References
1. Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System.
2. Sergio Martins and Yang Yang. Introduction to bitcoins: a pseudo-anonymous electronic currency system. In
Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research, CASCON 11,
pages 349350, Riverton, NJ, USA, 2011. IBM Corp.
3. David Pisinger. Where are the hard knapsack problems. Computers and Operations Research, 32, 2005.
4. Wenbo Mao and Kenneth G. Paterson. On the plausible deniability feature of internet protocols. http://isg.
rhul.ac.uk/
~
kp/IKE.ps, 2002.
5. Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and veriably encrypted signatures from
bilinear maps. In EUROCRYPT, pages 416432, 2003.
6. Jean-Sebastien Coron and David Naccache. Boneh et al.s k-element aggregate extraction assumption is equivalent
to the Die-Hellman assumption. In ASIACRYPT, pages 392397, 2003.
7. Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, and Hovav Shacham. Sequential aggregate signatures from
trapdoor permutations. In EUROCRYPT, pages 7490, 2004.
8. Huafei Zhu, Feng Bao, Tieyan Li, and Yongdong Wu. Sequential aggregate signatures for wireless routing
protocols. In Wireless Communications and Networking Conference, 2005 IEEE, volume 4, pages 24362439 Vol.
4, 2005.
9. Di Ma. Practical forward secure sequential aggregate signatures. In Masayuki Abe and Virgil D. Gligor, editors,
ASIACCS, pages 341352. ACM, 2008.
10. Alexandra Boldyreva, Craig Gentry, Adam ONeill, and Dae Hyun Yum. Ordered multisignatures and identity-
based sequential aggregate signatures, with applications to secure routing. In CCS 07: Proceedings of the 14th
ACM conference on Computer and communications security, pages 276285, New York, NY, USA, 2007. ACM.
11. Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, and Brent Waters. Sequential aggregate signatures and
multisignatures without random oracles. In EUROCRYPT, pages 465485, 2006.
11
12. Marc Fischlin, Anja Lehmann, and Dominique Schrder. History-free sequential aggregate signatures. In Ivan
Visconti and Roberto Prisco, editors, Security and Cryptography for Networks, volume 7485 of Lecture Notes in
Computer Science, pages 113130. Springer Berlin Heidelberg, 2012.
13. Kyle Brogle, Sharon Goldberg, and Leonid Reyzin. Sequential aggregate signatures with lazy verication from
trapdoor permutations. In Xiaoyun Wang and Kazue Sako, editors, Advances in Cryptology ASIACRYPT 2012,
volume 7658 of Lecture Notes in Computer Science, pages 644662. Springer Berlin Heidelberg, 2012.
14. Amitabh Saxena and Ben Soh. One-way signature chaining: A new paradigm for group cryptosystems. Interna-
tional Journal of Information and Computer Security, 2(3):268296, 2008.
15. E. Androulaki, G. Karame, M. Roeschlin, T. Scherer, and S Capkun. Evaluating user privacy in bitcoin. Cryp-
tology ePrint Archive, Report 2012/596, 2012.
16. Fergal Reid and Martin Harrigan. An analysis of anonymity in the bitcoin system. In Yaniv Altshuler, Yuval
Elovici, Armin B. Cremers, Nadav Aharony, and Alex Pentland, editors, Security and Privacy in Social Networks,
pages 197223. Springer New York, 2013.
17. Dorit Ron and Adi Shamir. Quantitative analysis of the full bitcoin transaction graph. Cryptology ePrint Archive,
Report 2012/584, 2012. http://eprint.iacr.org/.
18. Nicolas Christin. Traveling the silk road: A measurement analysis of a large anonymous online marketplace.
CoRR, abs/1207.7139, 2012.
19. Zerocoin: Anonymous distributed e-cash from bitcoin, 2012.
20. Daniele Micciancio. Generalized compact knapsacks, cyclic lattices, and ecient one-way functions. Computa-
tional Complexity, 16(4):365411, December 2007. Prelim. in FOCS 2002.
21. Vasek Chvatal. Hard knapsack problems. Operations Research, 28(6):14021411, 1980.
22. Ratna Dutta, Rana Barua, and Palash Sarkar. Pairing-based cryptographic protocols: A survey. In In Cryptology
ePrint Archive, Report 2004/064, 2004.
23. Alfred Menezes. An introduction to pairing-based cryptography. notes from lectures., 2005.
24. Michel Abdalla and Tanja Lange, editors. Pairing-Based Cryptography - Pairing 2012 - 5th International Confer-
ence, Cologne, Germany, May 16-18, 2012, Revised Selected Papers, volume 7708 of Lecture Notes in Computer
Science. Springer, 2013.
25. Dan Boneh and Matthew K. Franklin. Identity-based encryption from the Weil pairing. SIAM J. Comput.,
32(3):586615, 2003.
26. Victor S. Miller. The Weil pairing, and its ecient calculation. Journal of Cryptology, 17(4):235261, 2004.
27. Yukihiro Uchida and Shigenori Uchiyama. The Tate-Lichtenbaum pairing on a hyperelliptic curve via hyperelliptic
nets. In Michel Abdalla and Tanja Lange, editors, Pairing-Based Cryptography Pairing 2012, volume 7708 of
Lecture Notes in Computer Science, pages 218233. Springer Berlin Heidelberg, 2013.
28. F. Hess, N.P. Smart, and F. Vercauteren. The Eta pairing revisited. Information Theory, IEEE Transactions
on, 52(10):45954602, 2006.
29. Chang-An Zhao, Fangguo Zhang, and Jiwu Huang. A note on the Ate pairing. Cryptology ePrint Archive, Report
2007/247, 2007. http://eprint.iacr.org/.
30. Stanford Crypto Group Ben Lynn. Pbc library, 2010.
31. A. De Caro and V. Iovino. jpbc: Java pairing based cryptography. In Proceedings of the 2011 IEEE Symposium
on Computers and Communications, ISCC 11, pages 850855, Washington, DC, USA, 2011. IEEE Computer
Society.
32. A. De Caro and V. Iovino. Java pairing based cryptography library (jPBC), 2012.
33. Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, and Tsuyoshi Takagi. Key length estimation of pairing-
based cryptosystems using nT pairing. In Proceedings of the 8th international conference on Information Security
Practice and Experience, ISPEC12, pages 228244, Berlin, Heidelberg, 2012. Springer-Verlag.
34. Michael Scott. Scaling security in pairing-based protocols. IACR Cryptology ePrint Archive, 2005:139, 2005.
A Proof of Theorem 1
Proof. Let g, g
x
, g
y
G
1
be the given CDH instance we need to solve (our goal is to compute g
xy
). We show
how to solve this using A as a black-box.
Setup: We generate a
1
, a
2
, . . . a
n
R
Z
q
and set the target public keys as pk
i
= g
x+ai
for 1 i n. The
set PK = pk
i
i[1..n]
is given to A.
12
H-list: A can query the random oracle H on points from
G
1
. To respond to such queries, we
maintain a list called the H-list, which is initially empty and contains tuples of the type
(m, r, pk, h, b, c, d)
G
1
G
1
Z
q
Z
2
1,
such that h = g
cdy+b
always holds.
H-Queries: On H(m
i
, r
i
, pk
i
) query, if a tuple (m
i
, r
i
, pk
i
, h
i
, b
i
, c
i
, d
i
) exists in the H-list, we respond
with h
i
= H(m
i
, r
i
, pk
i
), otherwise we add such an entry as follows. We generate b
i
R
Z
q
uniformly and set
d
i
= 1. If pk
i
/ PK, we set c
i
= 0, otherwise we set c
i
= 1. Finally we set h
i
= g
ciy+bi
and respond with
h
i
= H(m
i
, r
i
, pk
i
). In eect, we compute h
i
as follows:
1. If pk
i
/ PK, we set h
i
= g
bi
.
2. If pk
i
PK, we set h
i
= g
bi+y
.
Sign queries: Let = ((m
1
, pk
1
), (m
2
, pk
2
), . . . (m
k
, pk
k
)) be any sign query for k n. To respond to
this, we generate k random numbers r
1
, r
2
, . . . r
k
R
k
i=1
c
i
d
i
= 0 and
k
k
i=1
c
i
Z
2
. The latter says that at most one of the c
i
s can be 0.
4
We then generate b
1
, b
2
, . . . b
k
R
Z
q
and for each i [1..k], we set h
i
= g
cidiyi+bi
. We add (m
i
, r
i
, pk
i
, h
i
, b
i
, c
i
, d
i
) to the H-list.
Let
= g
k
i=1
(x+ai)(cidiy+bi)
= g
xy
k
i=1
cidi+
k
i=1
xbi+aicidiy+aibi
. We know that
k
i=1
c
i
d
i
= 0 (by
construction). Therefore,
= g
k
i=1
xbi+aicidiy+aibi
, a value that can be computed by us. Also, =
(
, r
1
, r
2
, . . . r
k
) is a valid signature on , which is our response to the query.
Output: Finally, A outputs a pair (
A
,
A
). If
A
is not a valid forgery on
A
, we report failure. Let PK
A
be the set of public keys in this forgery. Some of these keys may not be from PK. Let PK
#
= PK
A
PK
and PK
= PK PK
A
.
By construction, all c
i
s in the H-list corresponding to the messages signed under PK
#
are 0. Therefore,
the respective b
i
s are the discrete logarithms (to base g) of the corresponding h
i
s. Hence, we can compute
the sub-aggregate signature corresponding to the messages of PK
, denoted by
1
, b
1
, c
1
, d
1
), . . . , (a
k
, b
k
, c
k
, d
k
)) be tuples containing a
i
s and H-list entries corresponding to
PK
. If
i=1
c
i
d
i
= 0, we report failure and abort, otherwise
= (
, r
1
, . . . r
k
) such that
= g
i=1
(x+a
i
)(c
i
d
i
y+b
i
)
= g
xy
i=1
c
i
d
i
g
i=1
xb
i
+a
i
c
i
d
i
y+a
i
b
i
= g
xyz
w
for some nonzero w and z that we know. Using this, we can compute g
xy
= (
/w)
1/z
.
It now remains to bound the probability of success. Dene events:
c
1
= We do not abort during sign queries.
c
2
= c
1
and A outputs a successful forgery.
c
3
= c
2
and
i=1
c
i
d
i
,= 0.
Then Pr[success] = Pr[c
3
[c
2
] Pr[c
2
[c
1
] Pr[c
1
].
Claim 1 Pr[c
1
]
1
+1
2
n
Proof. Consider the number of entries in the H-list corresponding to a given (message, public-key) pair
(m, pk). Each H-query can add at most one entry to the H-list for this pair. Since a sign query can contain
at most one instance of the pair (m, pk), therefore, each sign query can add at most one entry in the H-list
for this pair. Therefore there can be a maximum of + 1 entries in the H-list corresponding to (m, pk).
4
These pairs can be generated as follows. First set all cis to 1. If k is odd, randomly set one of the cis to 0. Then
for those cis that are 1, randomly set half of the dis to +1 and the rest to 1.
13
Now select r
R
and consider the event that an entry beginning with (m, r, pk) exists in the H-list. Since
there are 2
possible ways to select r, we can be assured that Pr[no entry in H-list for (m, r, pk)] 1
+1
2
.
Now there can be maximum n pairs in a sign query. Therefore, Pr[we do not abort in one sign query]
1
+1
2
n
, and so
Pr[c
1
] = Pr[we do not abort after at most sign queries]
1
+ 1
2
n
.
Claim 2 Pr[c
2
[c
1
] = .
Proof. If we do not abort during sign queries, then the view of the adversary is identical to a real simulation,
and it follows that Pr[c
2
[c
1
] = . .
Claim 3 Pr[c
3
[c
2
] 1/3
Proof. Split the H-list entries into two disjoint sets based on how they are generated:
1. S
1
: Via sign queries on a single (message, public-key) pair. Here Pr[c = 0] = 1.
2. S
2
: Via H-queries or via sign queries on two or more (message, public-key) pairs. It can be checked that
Pr[c = 0] 1/3 for such entries.
5
Let the forgery contain k
i
, r
i
, pk
i
)
i[1..k
]
be the set of tuples
corresponding to the forgery. We ensure that an entry for each tuple exists in the H-list (by simulating
H-queries ourselves if necessary).
Lemma 1. If the forgery is valid (i.e.,
A
is not signable), then at least one of the tuples in the forgery must
must correspond to an element of S
2
.
Proof. If all tuples (m
i
, r
i
, pk
i
)
i[1..k
]
in the forgery correspond to elements from S
1
, then A made sign
queries on every pair (m
i
, pk
i
), possibly more than once. By denition,
A
is signable. Hence the forgery
cannot be valid. .
For any signature
) =
k
i=1
c
i
d
i
, obtained from
corresponding entries (m
i
, r
i
, pk
i
, h
i
, b
i
, c
i
, d
i
) in the H-list. As goal is to maximize Pr[c
3
[c
2
] = Pr[f(
) =
0], knowing that f(
i
, r
i
, pk
i
) was used in at most one sign
query. Therefore As view of any of the c
i
s for tuples from S
2
is independent of any queries. Extending
Lemma 1, we can see that if
A
is not signable, then As view of f(
) is
independent of them. Therefore, assume that As forgery contains only elements from S
2
. Now S
2
can be
further divided into: (1) S
2
consisting of entries due to H-queries and (2) S
2
consisting of entries due to sign
queries. Since for elements of S
2
, the d
i
s are uniformly distributed between 1, while for those of S
2
, the d
i
s
are guaranteed to be +1, a symmetric argument shows that including elements from S
2
is not benecial to A
since it only biases f(
) towards nonzero. Therefore, assume that As forgery contains only elements from
S
2
. It can be experimentally veried that, if all elements are from S
2
, then Pr[f(
.
14