Shellproof: More Efficient Zero-Knowledge Proofs for Confidential Transactions in Blockchain

Blockchain-based cryptocurrencies enable decentralization in transaction systems. The transaction details of traditional cryptocurrencies, e.g. Bitcoin, are public to everyone, which can be a problem in confidential scenarios. To deal with the confidential problem, some current cryptocurrencies adopt confidential transactions to hide the details in proofs. Among all confidential transaction implementations, Bulletproof is the most efficient approach without a trusted setup. In this paper, we analyze Bulletproof’s design and show that the computation cost can be further reduced. Based on our analysis, we propose Shellproof, which is only half of the computation cost of Bulletproof. Experimental results show Shellproof can preserve the advantages of Bulletproof and is much more efficient than Bulletproof.

[1]  Jens Groth,et al.  Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting , 2016, EUROCRYPT.

[2]  Bin Xiao,et al.  Secure and energy efficient prefetching design for smartphones , 2016, ICC.

[3]  Eli Ben-Sasson,et al.  Scalable, transparent, and post-quantum secure computational integrity , 2018, IACR Cryptol. ePrint Arch..

[4]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[5]  Danny Bradbury,et al.  The problem with Bitcoin , 2013 .

[6]  Bin Xiao,et al.  Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System , 2019, CCS.

[7]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[8]  Dan Boneh,et al.  Bulletproofs: Short Proofs for Confidential Transactions and More , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[9]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[10]  Eli Ben-Sasson,et al.  SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.

[11]  Arvind Narayanan,et al.  Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .

[12]  Craig Gentry,et al.  Quadratic Span Programs and Succinct NIZKs without PCPs , 2013, IACR Cryptol. ePrint Arch..

[13]  Feng Hao,et al.  A Smart Contract for Boardroom Voting with Maximum Voter Privacy , 2017, IACR Cryptol. ePrint Arch..

[14]  Eli Ben-Sasson,et al.  Interactive Oracle Proofs with Constant Rate and Query Complexity , 2017, ICALP.