You are on page 1of 2

Future Generation Computer Systems 114 (2021) 647–648

Contents lists available at ScienceDirect

Future Generation Computer Systems


journal homepage: www.elsevier.com/locate/fgcs

Editorial

Editorial for accountability and privacy issues in blockchain and


cryptocurrency

Sherman S.M. Chow a , , Kim-Kwang Raymond Choo b , Jinguang Han c
a
Department of Information Engineering, Chinese University of Hong Kong, Shatin, N.T., Hong Kong
b
Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249-0631, USA
c
School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, UK

article info a b s t r a c t

Article history: The increasing popularity of blockchain and cryptocurrency reinforces the importance of accountability
Available online 27 August 2020 and privacy. Privacy is a fundamental human right, yet, malevolent or criminal should be held
accountable, which mitigates the severity of malicious and criminal exploitation even with privacy
protections in place. This editorial reports on the findings from seven accepted papers (acceptance
rate of 30.44%).
© 2020 Published by Elsevier B.V.

1. An overview of this special issue Their paper explained the potential for (market) manipulation
of the fluctuations in cryptocurrency prices (or exchange rate),
Cryptocurrency is a digital version of currency that uses cryp- particularly in cryptocurrencies based on the Proof of Work (PoW)
tographic technologies to guarantee the security of transactions. consensus algorithm. Seeking to mitigate the limitations, the
In recent years, cryptocurrencies such as Bitcoin and Ether are authors suggested making three changes to PoW-based cryp-
increasingly popular, including among cybercriminals (e.g., in tocurrency and demonstrated its potential using simulations.
ransomware cases). Blockchain underpins many of the exist- While Blockchain provides immutability, it is not compatible
ing cryptocurrencies and plays an extremely crucial role due with scenarios that expect summarizing or removing data for
to its many desirable properties (e.g., transaction distribution storage or privacy (e.g., ‘‘the right to be forgotten’’) requirements.
and decentralized consensus). Applications of blockchain include Dorri, Kanhere, and Jurdak [6] introduce multiple partially dis-
identity management, smart contract, and e-health, to name a tributed agents to remove or summarize blockchain transactions,
few. Similar to other technologies, ensuring privacy and account- with a reward mechanism incentivizing helpers of this process.
ability is important for many different reasons and scenarios, They also propose a key management technique that shares con-
which is also our focus in this special issue. ceptual similarities with hierarchical deterministic (HD) wallets.
Blockchain and cryptocurrency can be maliciously and crim- Security of the wallets is dependent on their implementations
inally exploited, as pointed out in two of the seven accepted and their building blocks, such as ECDSA signatures used to certify
papers in this special issue. For example, Moubarak, Chamoun, Bitcoin transactions. If there are backdoors in the implementa-
and Filiol [1] studied several blockchain-related features under- tion, they can be exploited to facilitate attacks such as klepto-
pinning Bitcoin, Ripple, Ethereum, Hyperledger, Algorand, and graphic attacks (i.e., leakage of the private key). Therefore, Wang,
IOTA networks, and demonstrated how vulnerabilities in these Li, Gao, and Li [3] proposed a kleptographically-secure HD wal-
features can be exploited to facilitate nefarious activities. On a let for multiple offline Bitcoin transactions, using an interactive
similar note, Bartoletti, Carta, Cimoli, and Saia [2] comprehen- signing protocol. Another potential implementation vulnerability
sively surveyed existing Ponzi schemes that can be, or had been, is weak randomness, and a deterministic solution was presented
carried out on Ethereum, and reported on their behavior and their in RFC 6979. Wang, Yu, Zhang, Piao, and Liu [4] analyzed Bit-
potential impacts and consequences. coin transactions from January 2009 to July 2017 to discover
Vulnerabilities that can be exploited are not restricted only a common pattern and clues for spam transaction attacks that
to technical weaknesses (e.g., bugs [3,4]) or social engineering may exploit the ECDSA weak randomness and surveyed popular
(e.g., Ponzi schemes [2]), as explained by Saito and Iwamura [5]. Bitcoin wallets to determine whether they conform to RFC 6979.
Blockchain can also help in building other applications to
∗ Corresponding author. achieve accountability and privacy. For example, Yang, Yi, Nepal,
E-mail addresses: sherman@ie.cuhk.edu.hk (S.S.M. Chow), Kelarev, and Han [7] used blockchain for their voting system to
raymond.choo@fulbrightmail.org (K.-K.R. Choo), J.Han@qub.ac.uk (J. Han). register all voters’ public keys, detect double voting, and ensure

https://doi.org/10.1016/j.future.2020.08.039
0167-739X/© 2020 Published by Elsevier B.V.
648 S.S.M. Chow, K.-K.R. Choo and J. Han / Future Generation Computer Systems 114 (2021) 647–648

each ballot’s integrity. All voters perturb their vote by a ran- We also thank all reviewers for their efforts in reviewing the
dom factor (which cancels each other as in existing self-tallying manuscripts (their names are omitted based on the editor-in-
systems), apply homomorphic encryption, and prepare a zero- chief’s suggestion).
knowledge proof (ZKP) for public detection of deviation. Final
tally decryption is shifted from the traditional tallying authori- References
ties to revealing decryption-key shares of all candidates, without
using ZKP. Future work on their system includes voter privacy, [1] J. Moubarak, M. Chamoun, E. Filiol, On distributed ledgers security and
illegal uses, Future Gener. Comput. Syst. 113 (2020) 183–195.
receipt freeness, and formal model and proofs for security.
[2] M. Bartoletti, S. Carta, T. Cimoli, R. Saia, Dissecting Ponzi schemes on
Ethereum: identification, analysis, and impact, Future Gener. Comput. Syst.
2. Concluding remarks 102 (2020) 259–277.
[3] H. Wang, X. Li, J. Gao, W. Li, MOBT: A kleptographically-secure hierarchical-
While this special issue has reported on various aspects of deterministic wallet for multiple offline Bitcoin transactions, Future Gener.
Comput. Syst. 101 (2019) 315–326.
accountability, blockchain, and cryptocurrency in the seven ac- [4] Z. Wang, H. Yu, Z. Zhang, J. Piao, J. Liu, ECDSA weak randomness in bitcoin,
cepted papers, there are many research problems with seemingly Future Gener. Comput. Syst. 102 (2020) 507–513.
conflicting requirements that need to be explored and addressed. [5] K. Saito, M. Iwamura, How to make a digital currency on a blockchain
For example: stable, Future Gener. Comput. Syst. 100 (2019) 58–69.
[6] A. Dorri, S.S. Kanhere, R. Jurdak, MOF-BC: a memory optimized and flexible
• Anonymity vs. accountability/auditability in other contexts blockchain for large scale networks, Future Gener. Comput. Syst. 92 (2019)
(e.g., cryptocurrency and reputation) 357–373.
[7] X. Yang, X. Yi, S. Nepal, A. Kelarev, F. Han, Blockchain voting: Publicly ver-
• Security vs. criminal misuse ifiable online voting protocol without trusted tallying authorities, Future
• Security vs. privacy (e.g., privacy-preserving authentication Gener. Comput. Syst. 112 (2020) 859–874.
and other decentralized systems) [8] S.S. Chow, A. Russell, Q. Tang, M. Yung, Y. Zhao, H. Zhou, Let a non-barking
• Cryptographic building blocks (e.g., privacy-enhancing sig- watchdog bite: Cliptographic signatures with an offline watchdog, in:
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference
natures, cliptographic signatures [8], sharding and consen- on Practice and Theory of Public-Key Cryptography, Beijing, China, April
sus protocols [9]) 14-17, 2019, Proceedings, Part I, in: Lecture Notes in Computer Science,
• Practical applications (e.g., auction [10], lottery [11], and vol. 11442, Springer, 2019, pp. 221–251.
data sharing [12]) [9] S.S. Chow, Z. Lai, C. Liu, E. Lo, Y. Zhao, Sharding blockchain, in: IEEE Inter-
natinal Workshop on Blockchain for the IoT, IEEE International Conference
• Applications in special scenarios (e.g., internet of things [13],
on Blockchain 2018, Halifax, NS, Canada, July 30 - August 3, 2018, IEEE,
intrusion detection [14]) 2018, p. 1665.
• Smart-contract applications [15] [10] J. Wang, S.S. Chow, Secure strategyproof ascending-price spectrum auction,
• Legal and regulation in: IEEE Symposium on Privacy-Aware Computing, PAC 2017, Washington,
DC, USA, August 1-4, 2017, IEEE, 2017, pp. 96–106.
[11] S.S. Chow, L.C.K. Hui, S. Yiu, K.P. Chow, Practical electronic lotteries with
Declaration of competing interest offline TTP, Comput. Commun. 29 (15) (2006) 2830–2840.
[12] W. Dai, C. Dai, K.R. Choo, C. Cui, D. Zou, H. Jin, SDTE: A Secure blockchain-
The authors declare that they have no known competing finan- based data trading ecosystem, IEEE Trans. Inf. Forensics Secur. 15 (2020)
cial interests or personal relationships that could have appeared 725–737.
[13] P.J. Taylor, T. Dargahi, A. Dehghantanha, R.M. Parizi, K.-K.R. Choo, A
to influence the work reported in this paper. systematic literature review of blockchain cyber security, Digit. Commun.
Netw. (ISSN: 2352-8648) 6 (2) (2020) 147–156.
Acknowledgments [14] W. Meng, E. Tischhauser, Q. Wang, Y. Wang, J. Han, When intrusion
detection meets blockchain technology: A review, IEEE Access 6 (2018)
10179–10188.
We thank all the submitting authors from Australia, China,
[15] W. Meng, J. Wang, X. Wang, J.K. Liu, Z. Yu, J. Li, Y. Zhao, S.S. Chow,
France, Germany, Italy, Japan, South Korea, Lebanon, Malaysia, Position paper on blockchain technology: Smart contract and applications,
Pakistan, Poland, Russia, and Taiwan, for their contributions. in: Network and System Security - 12th International Conference, NSS
2018, Hong Kong, August 27-29, 2018, Proceedings, in: Lecture Notes in
Computer Science, vol. 11058, Springer, 2018, pp. 474–483.

You might also like