{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:29:57Z","timestamp":1769041797758,"version":"3.49.0"},"reference-count":16,"publisher":"Vilnius University Press","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"abstract":"<jats:p>One of the main trends for the monitoring and control of business processes is to implement these processes via private blockchain systems. These systems must ensure data privacy and verifiability for the entire network here denoted by \u2018Net\u2019. In addition, every business activity should be declared to a trusted third party (TTP), such as an Audit Authority (AA), for tax declaration and collection purposes.\nWe present a solution for a confidential and verifiable realization of transactions based on the Unspent Transaction Output (UTxO) paradigm. This means that the total sum of transaction inputs (incomes) $In$ must be equal to the total sum of transaction outputs (expenses) $Ex$, satisfying the balance equation $In=Ex$. Privacy in a private blockchain must be achieved through the encryption of actual transaction values. However, it is crucial that all participants in the network be able to verify the validity of the transaction balance equation. This poses a challenge with probabilistically encrypted data. Moreover, the inputs and outputs are encrypted with different public keys. With the introduction of the AA, the number of different public keys for encryption can be reduced to two. Incomes are encrypted with the Receiver\u2019s public key and expenses with the AA\u2019s public key.\nThe novelty of our realization lies in taking additively-multiplicative, homomorphic ElGamal encryption and integrating it with a proposed paradigm of modified Schnorr identification providing a non-interactive zero-knowledge proof (NIZKP) using a cryptographically secure h-function. Introducing the AA as a structural element in a blockchain system based on the UTxO enables effective verification of encrypted transaction data for the Net. This is possible because the proposed NIZKP is able to prove the equivalency of two ciphertexts encrypted with two different public keys and different actors.\nThis integration allows all users on the Net to check the UTxO-based transaction balance equation on encrypted data. The security considerations of the proposed solution are presented.<\/jats:p>","DOI":"10.15388\/24-infor564","type":"journal-article","created":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T10:25:01Z","timestamp":1724063101000},"page":"601-616","source":"Crossref","is-referenced-by-count":2,"title":["Confidential Transaction Balance Verification by the Net Using Non-Interactive Zero-Knowledge Proofs"],"prefix":"10.15388","author":[{"given":"Au\u0161rys","family":"Kil\u010diauskas","sequence":"first","affiliation":[]},{"given":"Antanas","family":"Bendoraitis","sequence":"additional","affiliation":[]},{"given":"Eligijus","family":"Sakalauskas","sequence":"additional","affiliation":[]}],"member":"6097","published-online":{"date-parts":[[2024,8,19]]},"reference":[{"issue":"2","key":"2024082910113572343_j_infor564_ref_001","doi-asserted-by":"publisher","DOI":"10.1016\/j.hitech.2022.100437","article-title":"Emerging research on blockchain technology in finance; a conveyed evidence of bibliometric-based evaluations","volume":"33","year":"2022","journal-title":"The Journal of High Technology Management Research"},{"key":"2024082910113572343_j_infor564_ref_002"},{"key":"2024082910113572343_j_infor564_ref_003","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/SP.2018.00020","volume-title":"2018 IEEE Symposium on Security and Privacy (SP)","year":"2018"},{"key":"2024082910113572343_j_infor564_ref_004"},{"key":"2024082910113572343_j_infor564_ref_005","first-page":"332","volume-title":"Topics in Cryptology\u2013CT-RSA 2012: The Cryptographers\u2019 Track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings","year":"2012"},{"issue":"20","key":"2024082910113572343_j_infor564_ref_006","article-title":"Certificateless encryption supporting multi-ciphertext equality test with proxy-assisted authorization","volume":"12","year":"2023","journal-title":"The Journal of High Technology Management Research"},{"issue":"4","key":"2024082910113572343_j_infor564_ref_007","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","year":"1985","journal-title":"The Journal of High Technology Management Research"},{"key":"2024082910113572343_j_infor564_ref_008"},{"key":"2024082910113572343_j_infor564_ref_009","first-page":"119","volume-title":"Topics in Cryptology: Cryptographers\u2019 Track at the RSA Conference, CT-RSA 2010, San Francisco, March 1\u20135: Proceedings","volume":"5985","year":"2010"},{"key":"2024082910113572343_j_infor564_ref_010","doi-asserted-by":"crossref","first-page":"25409","DOI":"10.1109\/ACCESS.2019.2899680","article-title":"Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage","volume":"7","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"2024082910113572343_j_infor564_ref_011","doi-asserted-by":"publisher","first-page":"327","DOI":"10.15388\/Informatica.2019.208","article-title":"Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage","volume":"30","year":"2019","journal-title":"IEEE Access"},{"issue":"9","key":"2024082910113572343_j_infor564_ref_012","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1093\/comjnl\/bxy001","article-title":"A petri nets model for blockchain analysis","volume":"61","year":"2018","journal-title":"The Computer Journal"},{"key":"2024082910113572343_j_infor564_ref_013","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ELECTRONICS.2017.7995226","volume-title":"2017 Electronics","year":"2017"},{"issue":"1","key":"2024082910113572343_j_infor564_ref_014","first-page":"107","article-title":"A simple off-line E-cash system with observers","volume":"47","year":"2018","journal-title":"Information Technology and Control"},{"issue":"4","key":"2024082910113572343_j_infor564_ref_015","first-page":"603","article-title":"A petri nets model for blockchain analysis","volume":"34","year":"2023","journal-title":"Informatica"},{"key":"2024082910113572343_j_infor564_ref_016","first-page":"1","article-title":"Public key encryption with authorized equality test on outsourced ciphertexts for cloud-assisted IoT in dual server model","volume":"2022","year":"2022","journal-title":"Wireless Communications and Mobile Computing"}],"container-title":["Informatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1344\/text","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/informatica.vu.lt\/journal\/INFORMATICA\/article\/1344\/text","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T07:19:11Z","timestamp":1724915951000},"score":1,"resource":{"primary":{"URL":"https:\/\/informatica.vu.lt\/doi\/10.15388\/24-INFOR564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":16,"alternative-id":["10.15388\/24-INFOR564"],"URL":"https:\/\/doi.org\/10.15388\/24-infor564","relation":{},"ISSN":["0868-4952","1822-8844"],"issn-type":[{"value":"0868-4952","type":"print"},{"value":"1822-8844","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}