Читать книгу Blockchain for Business - Группа авторов - Страница 27
1.5.1 Mixing Services
ОглавлениеAs per the structure discussed in previous few sections the blockchains are linked with each other like sender or receiver of a transaction, therefore, by calculating and analyzing the public content (i.e., analytical attack), an individual can deduce some secret or privacy information or data to eliminate such attacks. One of the solutions is to confuse or blur the transaction’s relationships with the help of mixer (aka tumbler or laundry) as shown in Figure 1.5. The first mixing service introduced by Chaum [1], allows the user to hide his content of communication as well as the participants of the communication. The same concept is shown below in pictorial manner.
Figure 1.5 Basic architecture of mixing services [1].
Assume that one element prepares a message M for delivery to another substance at address R by encrypting it with the receiver’s open key KR, appending and attaching the address R, and afterward encrypting the result with the intermediary’s open key KI. The left-hand of the accompanying expression means the cipher content, which is transferred to an intermediary:
KI (r0, KR (r1, M), R) → KR (r1, M), R [1].
The symbol indicates the transformation of the cipher message by the intermediary into another cipher content appeared on the right-hand side. These transformations perform a decryption on the original cipher message by the intermediary with its private key. At that point the intermediary delivers the sub-cipher content to R who at that point decrypts it with his/her own private key. It is important to take note that r1 and r0 are random numbers which ensure that no message is transferred more than once [1].
At the point when the intermediary gets much information on input and output, this mechanism will shroud the correspondences between each message’s origin and destination. The order of arrival is covered up by yielding the uniformly estimated items in random patterns. Moreover, to minimize the danger of the single intermediary being the attacker, multiple intermediaries can be connected together thereby creating a mix cascade [1, 2].
Over the most recent couple of years, the services have been applied to the blockchain network to obfuscate the transaction history and reduce the risk of de-anonymization. These research efforts center around two main methods: (I) centralized mixing and (ii) decentralized mixing.
1 a. Centralized mixing is to mix transactions anonymously at the cost of some service fees. There are plenty of websites which work or behave like online mixers and swap the transactions among different users so as to shroud the relationship between their incoming and active transactions [1]. Likewise, most of them are reachable or contactable just through the TOR network which empowers anonymous communications through a free, worldwide, volunteer overlay network.
2 b. Decentralized mixing Decentralized mixing is to moderate the denial of services (DOS) danger caused or raised by the centralized services; a decentralized mixing design is proposed to empower a lot of commonly entrusted companions to distribute their messages at the same time and anonymously without the need of an outsider anonymity proxy [1, 4]. Another significant advantage of this methodology is the end of the requirement for mixing expenses. Moreover, it is nearer and progressively perfect to the decentralized structure of blockchain contrasted with the incorporated mixing design. Up until this point, there are for the most part two strategies to accomplish the decentralized mixing process, i.e., Coin Join and multi-party calculation (MPC).