A Stealthy Communication Model with Blockchain Smart Contract for Bidding Systems

Qi Liang,Ning Shi,Yu-an Tan,Chunying Li,Chen Liang
DOI: https://doi.org/10.3390/electronics13132523
IF: 2.9
2024-06-27
Electronics
Abstract:With the widespread adoption of blockchain technology, its public ledger characteristic enhances transaction transparency but also amplifies the risk of privacy breaches. Attackers can infer users' real identities and behaviors by analyzing public transaction patterns and address relationships, posing a severe threat to users' privacy and security, and thus hindering further advancements in blockchain applications. To address this challenge, covert communication has emerged as an effective strategy for safeguarding the privacy of blockchain users and preventing information leakage. But existing blockchain-based covert communication schemes rely solely on the immutability of blockchain itself for robustness and suffer from low transmission efficiency. To tackle these issues, this paper proposes a stealthy communication model with blockchain smart contract for bidding systems. The model initiates by preprocessing sensitive information using a secret-sharing algorithm-the Shamir (t, n) threshold scheme-and subsequently embeds this information into bidding amounts, facilitating the covert transfer of sensitive data. We implemented and deployed this model on the Ethereum platform and conducted comprehensive performance evaluations. To assess the stealthiness of our approach, we employed a suite of statistical tests including the CDF, the Kolmogorov–Smirnov test, Welch's t-test and K–L divergence. These analyses confirmed that amounts carrying concealed information were statistically indistinguishable from regular transactions, thus validating the effectiveness of our solution in maintaining the anonymity and confidentiality of information transmission within the blockchain ecosystem.
engineering, electrical & electronic,physics, applied,computer science, information systems
What problem does this paper attempt to address?
### Problems the Paper Attempts to Solve This paper aims to address the issue of privacy leakage when applying blockchain technology in auction systems. Although blockchain technology is widely used in areas such as financial transactions, smart contracts, and supply chain management due to its decentralization, transparency, and immutability, its public ledger characteristic also brings the risk of privacy leakage. Attackers can infer users' actual identities and behaviors by analyzing public transaction patterns and address relationships, thereby threatening users' privacy and security and hindering the further application of blockchain technology in scenarios with high privacy requirements. To tackle this challenge, the paper proposes a covert communication model based on blockchain smart contracts for auction systems. This model achieves covert transmission of sensitive data by preprocessing sensitive information (using the secret sharing algorithm—Shamir (t, n) threshold scheme) and embedding this information into bid amounts. Specifically, the main contributions of this model include: 1. **Proposing a covert communication model**: This model can effectively reduce the risk of privacy leakage in blockchain. 2. **Enhancing system robustness using the secret sharing algorithm**: It supports adjusting transmission parameters to ensure transmission performance. 3. **Experimental results show**: By adjusting the transmission index of the proposed scheme, it can balance concealment, robustness, and channel capacity, effectively improving the usability and effectiveness of the scheme. ### Summary of Main Content - **Background Introduction**: Introduces the advantages of blockchain technology and the privacy issues it brings, as well as the shortcomings of existing privacy protection methods. - **System Design**: Describes in detail the system architecture, threat model, and design goals of the covert communication model. - **Key Technologies**: Focuses on the application of the secret sharing algorithm (Shamir (t, n) threshold scheme) in information preprocessing. - **Experimental Evaluation**: Validates the effectiveness of the model through a series of statistical tests (such as CDF, Kolmogorov-Smirnov test, Welch’s t-test, and K-L divergence). In summary, this paper proposes a new covert communication model by combining blockchain smart contracts and secret sharing technology, aiming to protect user privacy in auction systems and prevent information leakage.