Origami Store: UC-Secure Foldable Datachains for the Quantum Era

Traditional blockchains preserve everything, if verification is to avoid trusted third parties. The accumulation of outdated but undeletable data makes traditional blockchains non-scalable for practical applications. Stateless blockchains mitigate this problem via history deletion; however, existing stateless blockchains such as Mimblewimble are not quantum resistant as they rely on specific discrete-log-based cryptography to achieve history deletion. In this paper, we introduce the “Origami Store” (or O-store for short), as a general new approach to distributed data storage with a generic history deletion mechanism called “folding.” O-store is built using a hash function and an arbitrary signature scheme. Since the signature scheme is decoupled from the framework, O-stores are compatible with any quantum-resistant signature scheme by design. More importantly, O-store only needs to preserve one signature and one verification key per account (or owner) for any number of transactions (or updates), thereby mitigating the inefficiency of large quantum-safe signatures and verification keys. We prove the security of the basic O-store using the framework of Universal Composability (UC); in particular, O-store’s universal security is shown to hold for a generic consensus mechanism, to facilitate implementation from a wide range of decentralized consensus protocols. The Origami store is thus the first UC-secure efficient distributed data storage framework that supports plug-and-play consensus mechanisms for fully decentralized trustless operation. We demonstrate working implementations of Origami stores with three post-quantum signature libraries—qTESLA, Dilithium, and Picnic—to illustrate its scalability and practicality for real-world applications.

[1]  Melanie Swan,et al.  Blockchain Thinking : The Brain as a Decentralized Autonomous Corporation [Commentary] , 2015, IEEE Technol. Soc. Mag..

[2]  Lianhai Wang,et al.  A Blockchain System Based on Quantum-Resistant Digital Signature , 2021, Secur. Commun. Networks.

[3]  Elaine Shi,et al.  Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.

[4]  Chen-Mou Cheng,et al.  New Differential-Algebraic Attacks and Reparametrization of Rainbow , 2008, ACNS.

[5]  Mostafa Belkasmi,et al.  Bitcoin Security with Post Quantum Cryptography , 2019, NETYS.

[6]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[7]  Aggelos Kiayias,et al.  Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability , 2018, IACR Cryptol. ePrint Arch..

[8]  Wei Peng,et al.  Proof of Reputation: A Reputation-Based Consensus Protocol for Peer-to-Peer Network , 2018, DASFAA.

[9]  Reza Azarderakhsh,et al.  Key Compression for Isogeny-Based Cryptosystems , 2016, AsiaPKC '16.

[10]  Stefan Jähnichen,et al.  Self-sovereign Identity - Opportunities and Challenges for the Digital Revolution , 2017, ArXiv.

[11]  Dan Boneh,et al.  Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains , 2019, IACR Cryptol. ePrint Arch..

[12]  Zhenfei Zhang,et al.  Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU , 2019 .

[13]  Chanathip Namprempre,et al.  From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security , 2002, EUROCRYPT.

[14]  Guido Perboli,et al.  Blockchain in Logistics and Supply Chain: A Lean Approach for Designing Real-World Use Cases , 2018, IEEE Access.

[15]  Paulo S. L. M. Barreto,et al.  The Lattice-Based Digital Signature Scheme qTESLA , 2020, IACR Cryptol. ePrint Arch..

[16]  Ittai Abraham,et al.  Aggregatable Subvector Commitments for Stateless Cryptocurrencies , 2020, IACR Cryptol. ePrint Arch..

[17]  Marco Baldi,et al.  Post-quantum cryptography based on codes: State of the art and open challenges , 2017, 2017 AEIT International Annual Conference.

[18]  Yonggang Wen,et al.  A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks , 2018, IEEE Access.

[19]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[20]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[21]  E. O. Kiktenko,et al.  Quantum-secured blockchain , 2017, Quantum Science and Technology.

[22]  Mohammad S. Obaidat,et al.  Edge Computing Based Healthcare Systems: Enabling Decentralized Health Monitoring in Internet of Medical Things , 2020, IEEE Network.

[23]  Georg Fuchsbauer,et al.  Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble , 2019, IACR Cryptol. ePrint Arch..

[24]  Marko Hölbl,et al.  A Systematic Review of the Use of Blockchain in Healthcare , 2018, Symmetry.

[25]  Lin Chen,et al.  On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.

[26]  Moti Yung,et al.  Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs , 2010, TCC.

[27]  Dragos Velicanu,et al.  A Decentralized Public Key Infrastructure with Identity Retention , 2014, IACR Cryptol. ePrint Arch..

[28]  Xavier Boyen,et al.  Lattice Mixing and Vanishing Trapdoors A Framework for Fully Secure Short Signatures and more , 2010 .

[29]  K. Sneha,et al.  Blockchain Identity Management , 2022, Essential Enterprise Blockchain Concepts and Applications.

[30]  Moti Yung,et al.  Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions , 2016, ICALP.

[31]  John M. Easton,et al.  Towards Encrypting Industrial Data on Public Distributed Networks , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[32]  Mario E. Magaña,et al.  Post-quantum hybrid security mechanism for MIMO systems , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).

[33]  Boi Faltings,et al.  An incentive compatible reputation mechanism , 2003, AAMAS '03.

[34]  Roberto Baldoni,et al.  PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.

[35]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[36]  Dipankar Dasgupta,et al.  A survey of blockchain from security perspective , 2019, J. Bank. Financial Technol..

[37]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[38]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).

[39]  Bo-Yin Yang,et al.  Tame Transformation Signatures With Topsy-Turvy Hashes , .

[40]  Johannes A. Buchmann,et al.  XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions , 2011, IACR Cryptol. ePrint Arch..

[41]  Leonid Reyzin,et al.  Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies , 2017, Financial Cryptography.

[42]  Jian Li,et al.  A New Lattice-Based Signature Scheme in Post-Quantum Blockchain Network , 2019, IEEE Access.

[43]  William J. Knottenbelt,et al.  Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack , 2018, Royal Society Open Science.

[44]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[45]  Chris Peikert,et al.  On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.

[46]  Steven D. Galbraith,et al.  Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems , 2017, ASIACRYPT.

[47]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[48]  Samuel Fosso Wamba,et al.  Blockchain adoption challenges in supply chain: An empirical investigation of the main drivers in India and the USA , 2019, Int. J. Inf. Manag..

[49]  Dario Fiore,et al.  Vector Commitments and Their Applications , 2013, Public Key Cryptography.

[50]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[51]  Xavier Boyen,et al.  Graphchain: a Blockchain-Free Scalable Decentralised Ledger , 2018, BCC '18.

[52]  Xiao Wang,et al.  Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach , 2018, IEEE Transactions on Computational Social Systems.

[53]  Sudheendra Hangal,et al.  PrPl: a decentralized social networking infrastructure , 2010, MCS '10.

[54]  Zhenfei Zhang,et al.  Pointproofs: Aggregating Proofs for Multiple Vector Commitments , 2020, IACR Cryptol. ePrint Arch..

[55]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[56]  Yury Yanovich,et al.  Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare , 2015, Oncotarget.

[57]  Mickael Bech,et al.  The Danish health care system: evolution--not revolution--in a decentralized system. , 2005, Health Economics.

[58]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[59]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[60]  Alice Cheng,et al.  Sybilproof reputation mechanisms , 2005, P2PECON '05.

[61]  Tomi Dahlberg,et al.  Digital Supply Chain Transformation toward Blockchain Integration , 2017, HICSS.

[62]  Yumin Wang,et al.  Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[63]  Ueli Maurer,et al.  Bitcoin as a Transaction Ledger: A Composable Treatment , 2017, CRYPTO.

[64]  Daniel E. O'Leary,et al.  Configuring Blockchain Architectures for Transaction Information in Blockchain Consortiums: The Case of Accounting and Supply Chain Systems , 2017, Intell. Syst. Account. Finance Manag..

[65]  Aggelos Kiayias,et al.  A Composable Security Treatment of the Lightning Network , 2020, 2020 IEEE 33rd Computer Security Foundations Symposium (CSF).

[66]  Roy H. Campbell,et al.  World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).

[67]  Paula Fraga-Lamas,et al.  Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks , 2020, IEEE Access.

[68]  Vadim Lyubashevsky,et al.  Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..

[69]  H. Krumholz,et al.  Blockchain Technology: Applications in Health Care , 2017, Circulation. Cardiovascular quality and outcomes.

[70]  Reza Azarderakhsh,et al.  A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies , 2017, Financial Cryptography.

[71]  Quanlong Wang,et al.  A Simple Voting Protocol on Quantum Blockchain , 2018, International Journal of Theoretical Physics.

[72]  Quanlong Wang,et al.  Towards Quantum-Secured Permissioned Blockchain: Signature, Consensus, and Logic , 2019, Entropy.

[73]  Bo-Yin Yang,et al.  Design Principles for HFEv- Based Multivariate Signature Schemes , 2015, ASIACRYPT.

[74]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[75]  Ahmed Serhrouchni,et al.  Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..

[76]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[77]  Peter Schwabe,et al.  SPHINCS: Practical Stateless Hash-Based Signatures , 2015, EUROCRYPT.

[78]  Daniel Slamanig,et al.  Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives , 2017, CCS.

[79]  R. Monfared,et al.  Blockchain ready manufacturing supply chain using distributed ledger , 2016 .

[80]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[81]  Vadim Lyubashevsky,et al.  Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures , 2009, ASIACRYPT.

[82]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[83]  Vlastimil Clupek,et al.  Secure digital archiving in post-quantum era , 2015, 2015 38th International Conference on Telecommunications and Signal Processing (TSP).

[84]  James Brown,et al.  Blockchained Post-Quantum Signatures , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[85]  Elmar Fürst,et al.  Blockchain for and in Logistics: What to Adopt and Where to Start , 2018, Logistics.

[86]  Ran Canetti,et al.  Universally composable signature, certification, and authentication , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[87]  Blockchain for E-Healthcare Systems: Easier Said Than Done , 2020 .

[88]  Nicolas Courtois On multivariate signature-only public key cryptosystems , 2001, IACR Cryptol. ePrint Arch..

[89]  D. Baars Towards self-sovereign identity using blockchain technology , 2016 .

[90]  Nabil Bouzerna,et al.  Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[91]  Charalampos Papamanthou,et al.  Edrax: A Cryptocurrency with Stateless Transaction Validation , 2018, IACR Cryptol. ePrint Arch..

[92]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[93]  Tanesh Kumar,et al.  Blockchain Utilization in Healthcare: Key Requirements and Challenges , 2018, 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom).

[94]  William Whyte,et al.  Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign , 2005, IACR Cryptol. ePrint Arch..

[95]  Tanja Lange,et al.  Flush, Gauss, and reload : a cache attack on the BLISS lattice-based signature scheme , 2016 .

[96]  David Jao,et al.  Efficient Compression of SIDH Public Keys , 2017, EUROCRYPT.

[97]  Aviv Zohar,et al.  Secure High-Rate Transaction Processing in Bitcoin , 2015, Financial Cryptography.

[98]  Fucai Zhou,et al.  A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications , 2020, Comput. J..

[99]  Andrei Lebedev,et al.  YAC: BFT Consensus Algorithm for Blockchain , 2018, ArXiv.

[100]  Alberto Montresor,et al.  Efficient dissemination in decentralized social networks , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[101]  Ying Sun,et al.  A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain , 2018, IEEE Access.

[102]  Christoph Meinel,et al.  A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..

[103]  Leslie Lamport,et al.  Constructing Digital Signatures from a One Way Function , 2016 .

[104]  Damien Stehlé,et al.  CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[105]  Nagaveni B. Biradar,et al.  IOTA-Next Generation Block chain , 2018 .

[106]  Jim Groom,et al.  The Path to Self-Sovereign Identity , 2017 .