Proposal for a method of exchanging tokens among different blockchains by multiple users

项目来源

日本学术振兴会基金(JSPS)

项目主持人

宮地秀至

项目受资助机构

立命館大学

项目编号

24K20774

立项年度

2024

立项时间

未公开

项目级别

国家级

研究期限

未知 / 未知

受资助金额

4680000.00日元

学科

情報セキュリティ関連

学科代码

未公开

基金类别

若手研究

关键词

暗号方式 ; ブロックチェーン ; クロスチェーンコミュニケーション ; コミットメント方式 ; 効率的 ;

参与者

未公开

参与机构

未公开

项目标书摘要:Outline of Research at the Start:中央集権的に管理されない経済圏を構築するために,ブロックチェーンを用いた自律分散システムが期待されているが,既存の方式ではデータ量の保管方法や効率的なデータ通信方法が実現されていない.本研究では,異なるブロックチェーン間の処理の記録を大幅に削減し,資産の流通をより効率化できる経済圏を実現する.さらに,既存方式のみでは実現できない,集約されている値から必要な値を読み取る技術を,準同型性(暗号化したまま計算可能な性質)などを利用し,実現する.これにより,異なるブロックチェーン間での資産流通の効率化を実現すると共に,プライバシー保護も可能とする信頼性のある経済圏の流通を実現する。

  • 排序方式:
  • 1
  • /
  • 1.Efficient Token Exchange Scheme among Different Blockchain Ledgers

    • 关键词:
    • Chains;Costs;Distributed ledger;Electronic commerce;Fees and charges;Smart contract;Aggregate cross-chain communication;Block-chain;Centralised;Commitment scheme;Cross-chain communication;Exchange rates;Fair exchange;Insert key-value commitment scheme;Key values;Trusted third parties
    • Miyaji, Hideaki;Hsu, Po-Chu;Yamamoto, Hiroshi
    • 《IEICE Transactions on Information and Systems》
    • 2026年
    • E109.D卷
    • 2期
    • 期刊

    A blockchain is a distributed ledger that allows users to exchange information without a centralized authority. This technology enables users to send and receive tokens among other applications, such as transactions, product management, and elections. It is possible to send data and tokens inside a single blockchain, but a method to efficiently share the data and tokens among different blockchains has not yet been constructed. Cross-chain communication, the focal point of several recent research efforts, is a scheme for sending data or tokens among different blockchains. In existing studies, a trusted third party (TTP) is used to ensure fair rates of token exchange among different blockchains. However, because blockchains are originally designed with a policy that does not incorporate the use of TTPs, the fair exchange rate should not be determined by TTPs, but rather by the market price of tokens among users. When exchange rates are determined from quotes among users, the preferred scheme is to determine the exchange rate offered by many users as an auction. Here, some existing cross-chain communication systems use smart contracts that automatically execute arbitrary processes on the blockchain. However, such schemes require a gas fee each time a smart contract is executed. Thus, implementing an auction scheme that determines the fair exchange rate among different blockchains would necessitate each user to pay a fee for each new token offered, which would result in high gas fees. In this study, we propose a scheme to determine exchange rates from quotes among users with a relatively low gas fee. Using a first-price sealed-bid auction and commitment scheme, the user with the highest token value can be identified without revealing the other users’ token offer values. In our scheme, the largest token value among users is determined as the exchange rate using an external Smart Contract (SC) instead of a TTP. We further modify the existing insert key-value commitment scheme to aggregate the commitment values of token offers. Our scheme is based on the generalized RSA assumption. By proving that it satisfies the key-binding property, we prove that the token sender cannot act maliciously. We further implement the proposed scheme and demonstrate that the gas fees and data space required to implement the proposed scheme are practically feasible. Copyright © 2026 The Institute of Electronics, Information and Communication Engineers.

    ...
  • 2.Lattice-Based Key-Value Commitment Scheme

    • 关键词:
    • Blockchains; Vectors; Resistance; Scalability; Receivers; Protocols;Costs; Robots; Quantum computing; Proposals; Security; post quantumcryptography; lattice-based key-value commitment scheme; key-binding;key-hiding; applied cryptography; applied to blockchain;SECURE
    • Miyaji, Hideaki;Miyaji, Atsuko
    • 《IEEE TRANSACTIONS ON INFORMATION THEORY》
    • 2025年
    • 71卷
    • 6期
    • 期刊

    A blockchain is an important component in the design of secure distributed file systems, such as cryptocurrencies. One of the key components of the blockchain is the key-value commitment scheme, which constructs a commitment value from two inputs: a key and a value. In a conventional commitment scheme, a single user constructs a commitment value from an input value, whereas in a key-value commitment scheme, multiple users construct a commitment value from their keys and values. Both conventional and key-value commitment schemes must satisfy binding and hiding properties. The key-binding and key-hiding properties guarantee that neither the sender nor the verifier can act maliciously. The concept of a key-value commitment scheme was first proposed by Agrawal et al. in 2020 using a strong RSA assumption. Their scheme satisfies the key-binding but not key-hiding properties. In this paper, we propose two lattice-based key-value commitment schemes, Insert-KVCm/2,n,q,beta and KVCm,n,q,beta , that satisfy both the key-binding and the key-hiding properties. The key-binding property of both Insert-KVCm/2,n,q,beta and KVCm,n,q,beta are proven under the short integer solution ( SIS infinity n,m,q,beta ) problem. The key-hiding property of both Insert-KVCm/2,n,q,beta and KVCm,n,q,beta are proven under the Decisional- SISn,m,q,beta infinity -form problem, which is newly defined in this paper. We demonstrate the difficulty of the Decisional- SISn,m,q,beta infinity -form problem by showing that the Decisional- SISn,m,q,beta infinity -form problem is secure when the SISn,m,q,beta infinity problem is secure. Finally, we analyze the computational costs of Insert-KVCm/2,n,q,beta and KVCm,n,q,beta . Our method is the first lattice-based key-value commitment scheme with proven the key-binding and the key-hiding properties.

    ...
  • 3.Privacy-Diffusion: Privacy-Preserving Stable Diffusion Without FHE and Differential Privacy

    • 关键词:
    • Privacy; Protocols; Noise; Computational modeling; Diffusion models;Neural networks; Servers; Accuracy; Quantization (signal); Predictivemodels; AI security; privacy ML; stable diffusion; generative AI
    • Hsu, Po-Chu;Yu, Ziying;Mise, Shuhei;Miyaji, Hideaki
    • 《IEEE ACCESS》
    • 2025年
    • 13卷
    • 期刊

    Text-to-image generation is trending in the generative artificial intelligence (GenAI) field. Among open-sourced image generation projects, Stable Diffusion is the state-of-the-art. Many artists and service providers customize the diffusion model to generate featured high-quality images. However, there is no protection to the privacy of the input text prompt, output image, and customized model. Privacy is very important since it can increase users' willingness to use the service and protect the service provider's intellectual property. Existing privacy-preserving diffusion model require fully homomorphic encryption (FHE) to ensure its privacy and security. Nonetheless, FHE is very time-consuming and may reduce accuracy due to approximations and deteriorate image quality. In this research, we propose Privacy-Diffusion, a privacy-preserving diffusion framework without FHE. By utilizing the irreversible property of neural network layers and the property that the predicted noise in the diffusion process is a normalized Gaussian distribution. Our framework can be applied to all kinds of diffusion models to protect clients' input text prompt and the generated image from being learned by the server, as well as customized models from being learned by the clients. Our protocol is secure and efficient. Compared with existing research, HE-diffusion, which spent 200% extra time and visible quality loss, our protocol can reach the same security level with only 19% extra time and has no quality loss. To the best of our knowledge, our Privacy-Diffusion is the first protocol that achieves this goal without using FHE and maintain the same high-quality image output as the original model.

    ...
  • 4.Lattice-based Commitment Scheme for Low Communication Costs

    • 关键词:
    • Binding energy;Blockchain;Combinatorial optimization;Quantum cryptography;AES-128;Binding properties;Block-chain;Commitment scheme;Hiding property;Lattice;Lattice-based;Lattice-based protocol;Property;Receiver ;Search problem
    • Miyaji, Hideaki;Wang, Yuntao;Miyaji, Atsuko
    • 《IEEE Access》
    • 2024年
    • 期刊

    Commitment schemes are cryptographic schemes that can be applied to zero-knowledge proof construction and blockchain construction. Recently, lattice-based cryptography has been intensively investigated due to the promising potential in quantum cryptography. Accordingly, commitment schemes based on lattice assumptions have been studied for practical applications. Notably, applications often require committing an arbitrary message with low communication costs, so commitment schemes must be satisfied with fewer length restrictions and fewer extensions to the messages. Several studies have been conducted to achieve the problem, including the study published by Baum et al. in 2018. However, the scheme in question still utilizes the message domain for extraneous purposes. We design a length-extension-free commitment scheme ComMWM in which the length of the message string is large relative to the length of the commitment string, improving on the commitment scheme of Baum et al. Furthermore, we prove that the hiding and binding properties of ComMWM are based on the hardness of the decisional search knapsack problem and extended search knapsack problems, respectively. Finally, we evaluate the computation costs of generating commitment value between ours and Baum et al.’s commitment scheme. Authors

    ...
  • 排序方式:
  • 1
  • /