Proposal for a method of exchanging tokens among different blockchains by multiple users

项目来源

日本学术振兴会基金(JSPS)

项目主持人

宮地秀至

项目受资助机构

立命館大学

立项年度

2024

立项时间

未公开

项目编号

24K20774

研究期限

未知 / 未知

项目级别

国家级

受资助金额

4680000.00日元

学科

情報セキュリティ関連

学科代码

未公开

基金类别

若手研究

关键词

暗号方式 ; ブロックチェーン ; クロスチェーンコミュニケーション ; コミットメント方式 ; 効率的 ;

参与者

未公开

参与机构

未公开

项目标书摘要:Outline of Research at the Start:中央集権的に管理されない経済圏を構築するために,ブロックチェーンを用いた自律分散システムが期待されているが,既存の方式ではデータ量の保管方法や効率的なデータ通信方法が実現されていない.本研究では,異なるブロックチェーン間の処理の記録を大幅に削減し,資産の流通をより効率化できる経済圏を実現する.さらに,既存方式のみでは実現できない,集約されている値から必要な値を読み取る技術を,準同型性(暗号化したまま計算可能な性質)などを利用し,実現する.これにより,異なるブロックチェーン間での資産流通の効率化を実現すると共に,プライバシー保護も可能とする信頼性のある経済圏の流通を実現する。

  • 排序方式:
  • 1
  • /
  • 1.Anonymous-Diffusion: Blockchain-Based Privacy-Preserving Stable Diffusion

    • 关键词:
    • Anonymity;Artificial intelligence;Blockchain;Diffusion;Image quality;Network security;Open source software;Open systems;Privacy-preserving techniques;Textures;AI security;Block-chain;Diffusion model;Fully homomorphic encryption;Generative AI;Image generations;Open source projects;Privacy ML;Privacy preserving;Stable diffusion
    • Hsu, Po-Chu;Yu, Ziying;Ghafoori, Nasratullah;Mise, Shuhei;Miyaji, Hideaki
    • 《1st International Conference on Consumer Technology, ICCT-Pacific 2025》
    • 2025年
    • March 29, 2025 - March 31, 2025
    • Matsue, Japan
    • 会议

    The field of generative AI is currently seeing a surge in text-to-image generation. Among open-source projects, Stable Diffusion stands out as the state-of-the-art. Artists and service providers often customize diffusion models for unique textures. However, there is a lack of privacy protection for users' input text prompts, output images, and customized models on servers. Ensuring privacy is essential for user trust and safeguarding intellectual property. Current privacy-preserving diffusion models rely on fully homomorphic encryption (FHE), which is time-intensive and can compromise image quality. We introduce Anonymous-Diffusion, a diffusion as a service (DAAS) framework. This framework maintains privacy without using FHE by exploiting the irreversible nature of neural network layers and the characteristic that predicted noise in the diffusion process follows a normalized Gaussian distribution. Furthermore, we ensure anonymity by Smart Contract and Blockchain. User can use this service on demand anonymously. In comparison to existing research like HE-diffusion, which incurs a 200% time overhead and noticeable quality degradation, our protocol achieves the same level of security with only a 4% time overhead and no loss in image quality. To our knowledge, this is the first solution to achieve these results without FHE while preserving high-quality image output. © 2025 IEEE.

    ...
  • 2.PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based onParent-Child Blockchain

    • 关键词:
    • Binding energy;Chains;Fault tolerance;Network security;Privacy-preserving techniques;Block-chain;Commitment scheme;Communication complexity;Communication privacy;Cross-chain communication;Parent-child blockchain;Privacy preserving;Unforgeability;Unlinkability;Zero-knowledge proofs
    • Miyaji, Hideaki;Kamiyama, Noriaki
    • 《30th Australasian Conference on Information Security and Privacy, ACISP 2025》
    • 2025年
    • July 14, 2025 - July 16, 2025
    • Wollongong, NSW, Australia
    • 会议

    Cross-chain communication is the cryptographic technology that sends and receives tokens or data among multiple blockchains. A parent-child blockchain system is one of the methods of cross-chain communication. Existing studies apply Byzantine fault-tolerant (BFT) mechanisms to achieve consensus among multiple N blockchains. However, cross-chain communication based on PBFT requires O(N2) communication complexity to achieve consensus mechanisms among multiple N blockchains (no scalability). In addition, existing cross-chain communication do not propose a scheme to prevent a malicious act by users who mediate tokens (no security). Furthermore, there is no existing scheme that simultaneously satisfies unforgeability, which prevents the sender of a token from forging the sent token, and unlinkability, which protects the privacy of the sender and receiver (no unlinkability and no unforgeability). In this paper, we propose a Privacy-Preserving Scalable Cross-Chain Communication (PPSCCC) among multiple blockchains that solve the above problems. In PPSCCC, by applying the commitment scheme to the token mediators, the communication complexity among blockchains for consensus mechanism can be achieved with O(N). We also prove unlinkability and unforgeability by using the hiding and binding properties of the commitment scheme. In addition, by introducing Proof of Commitment Reputation (PoCR), we achieve a scheme to prevent malicious behavior of users who mediate tokens. We then implement our proposed scheme. Finally, we compare our scheme with existing schemes to highlight the strengths of our scheme and show that our scheme is more practical. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.

    ...
  • 3.Privacy-Diffusion: Privacy-Preserving Stable Diffusion Without Homomorphic Encryption

    • 关键词:
    • Anonymity;Open systems;Privacy by design;Sensitive data;AI security;Diffusion model;Fully homomorphic encryption;Generative AI;Homomorphic-encryptions;Privacy ML;Privacy preserving;Property;Quality loss;Stable diffusion
    • Hsu, Po-Chu;Yu, Ziying;Mise, Shuhei;Miyaji, Hideaki
    • 《2025 IEEE International Conference on Consumer Electronics, ICCE 2025》
    • 2025年
    • January 11, 2025 - January 14, 2025
    • Las Vegas, NV, United states
    • 会议

    Text-to-image generation is trending in the generative AI field. Stable Diffusion is the state-of-the-art among open-source projects. Many artists and service providers customize the diffusion model for special textures. However, there is no protection for the privacy of the user's input text prompt, output image, and the customized model on the server. Privacy is crucial for user trust and protecting intellectual property. Existing privacy-preserving diffusion models use fully homomorphic encryption (FHE), which is time-consuming and can degrade image quality. We propose Privacy-Diffusion, a framework that preserves privacy without FHE by leveraging the irreversible properties of neural network layers and the property that in the diffusion process, the predicted noise is a normalized Gaussian distribution. Our framework protects clients' input text prompts and generated images from the server and safeguards customized models from clients. Compared with existing research HE-diffusion which spent 200% extra time and visible quality loss, our protocol can reach the same security level with only 4% extra time and has no quality loss. To our knowledge, we are the first to achieve this goal without FHE while maintaining high-quality image output. © 2025 IEEE.

    ...
  • 4.Privacy-preserving efficient M+1st-price sealed bid auction in cross-chain communication

    • 关键词:
    • Blockchain;Cryptography;Block-chain;Commitment scheme;Cross-chain communication;CryptoGraphics;Encryption schemes;Privacy preserving;Sealed-bid auctions;Vector commitment scheme
    • Miyaji, Hideaki;Kamiyama, Noriaki
    • 《12th International Symposium on Computing and Networking Workshops, CANDARW 2024》
    • 2024年
    • November 26, 2024 - November 29, 2024
    • Naha, Japan
    • 会议

    Cross-chain communication is a cryptographic technology that allows communication between different blockchains. Cross-chain communication is a technology that is gaining attention to expand the potential of blockchains, but it is difficult to construct securely and efficiently. The construction of the M+1st-price sealed bid auction in cross-chain communication is also one of the difficult schemes to realize. The existing M+1st-price sealed bid auction scheme uses a commitment scheme that needs to open the winner's bid amount after the auction is finished, which does not protect privacy. Furthermore, it is inefficient to construct it using the existing commitment scheme since there are multiple blockchain participants as bidders in cross-chain communication. In this paper, we propose a privacy-preserving and efficient M+1st-price sealed bid auction in cross-chain communication. To achieve privacy-preserving, we propose a scheme that can determine the maximum bid amount without disclosing the largest bidder using a vector commitment scheme. Furthermore, the vector commitment scheme allows the verifier to aggregate multiple bid values into one commitment. Thus, efficiency can be achieved by aggregating the multiplier commitment value by using a vector commitment scheme. Also, by combining the vector commitment scheme and encryption scheme, only the verifier can compare the bid value. Finally, we compare our scheme and other existing schemes to emphasize the contribution of our scheme. © 2024 IEEE.

    ...
  • 5.Proposal for Key-Value Commitments with Offline Batch Update

    • 关键词:
    • ;Batch update;Block-chain;Data storage;Key values;Key-value commitment;Key-value pairs;Offline;Updated informations;Verifiable credential;Virtual currency
    • Mineta, Toshiyuki;Miyaji, Atsuko;Miyaji, Hideaki
    • 《19th Annual Asia Joint Conference on Information Security, AsiaJCIS 2024》
    • 2024年
    • August 13, 2024 - August 14, 2024
    • Hybrid, Tainan, Taiwan
    • 会议

    As Blockchain grows in size, the resources to vali-date that a transaction is true increase. Key-value commitments are suggested to solve this problem. If we use Key-Value Commitments, we can authenticate affiliation by three elements, commitment, key-value pair, and proof. But in this method, if users are offline, which means they cannot receive updated information, their proof will expire. In this research, we propose a method that users to update proof with the information they return online. The previous scheme allows updating the proof in O (1), but n users must execute the update. Furthermore, adding an off-line update function requires O(T) data storage. In our proposal, we need only O(log n) update proofs, and we can realize it only one user to update the proof. © 2024 IEEE.

    ...
  • 排序方式:
  • 1
  • /