TokenMark: Anonymous Trust-Marking on Blockchain
- TokenMark is a cryptographically rigorous protocol for anonymously marking blockchain addresses with trust tokens, ensuring issuer privacy and auditability.
- The system employs accountable ring signatures and Pedersen commitments over Curve25519 to achieve security properties like unforgeability, anonymity, and revocability.
- TokenMark supports efficient forensic tagging across Bitcoin, Ethereum, and NEM, offering practical on-chain deployment with measurable performance metrics.
TokenMark, formally described as the “Anonymous Trust-Marking Scheme on Blockchain Systems,” is a cryptographically rigorous protocol enabling authorized marking of blockchain addresses with trust or untrust tokens, in a manner that preserves issuer anonymity while supporting auditability, revocability, and unforgeability. The system generalizes incident-driven tagging strategies (e.g., the Mosaic token for NEM in the Coincheck breach) by allowing trusted entities to make cryptographically provable, yet unlinkable, attributions about addresses across cryptocurrencies, with opening powers delegated only to designated auditors. The protocol’s core is an accountable ring signature (ARS) construction (after Bootle et al., ASIACRYPT 2015), augmented by Pedersen commitments, implemented over Curve25519, and efficient for deployment on Bitcoin, Ethereum, and NEM (Sato et al., 2020).
1. System Model and Security Objectives
TokenMark assumes an underlying public or permissioned blockchain supporting arbitrary data payloads in transactions. The model comprises four active entities:
- Token Admitter: An entity (with ARS keypair ) authorized to tag blockchain addresses as "trustworthy" or "untrustworthy." Each issuance ties to a designated auditor.
- Token Submitter: An agent (distinct from the Admitter) that embeds issued tokens into blockchain transactions, paying necessary on-chain fees.
- Token Verifier: Any party wishing to validate on-chain tokens’ authenticity and issuance by an authorized Admitter.
- Auditor: Holder of an opener keypair able to “open” ARS-signatures on tokens attributable to .
The system targets four formal security properties:
- Anonymity: Only the (designated) Auditor (and the Token Submitter) can learn the identity of the Admitter for a given token. The ARS scheme ensures that, for a ring of size , adversaries with all but one signing and opening keys cannot distinguish the signer beyond probability .
- Auditability: Only the designated Auditor can provably open a valid signature to the unique Admitter, and signatures cannot be forged to frame honest Admitter.
- Unforgeability: Adversaries (even corrupting all but one Admitter and the Auditor) cannot forge valid marks for an honest Admitter w.r.t. verification.
- Revocability: Only the original Admitter is able to issue revocations of previously issued tokens, based on binding commitment to unique randomness per issuance.
2. Entity Roles and Cryptographic State
The scheme delineates strict key and state requirements:
- End Users: Own addresses subject to marking; not actors in issuance or protocol cryptography.
- Token Admitter : Maintains (ARS keys), auditor selection , and secret for revocation. Stores sufficient local state to re-generate opening evidence.
- Token Submitter: Receives finalized from the Admitter and is entrusted to embed this without knowledge of or .
- Designated Auditor : Possesses ; can run ARS.Open to recover the issuer of any token designating .
- Non-Designated Auditors: Hold opener keys for other indices; cannot open signatures outside their assignment.
3. Cryptographic Primitives and Pseudocode
The scheme employs two cryptographic blocks:
- Accountable Ring Signature (ARS): Realized in a prime-order group (Curve25519), following Bootle et al., permitting proofs of one-out-of- knowledge and designated opener tracing. Public parameters include group generators and ElGamal public key .
- Pedersen Commitment: Used for linking value , foundation for issuer-controlled revocation. Standard commitment and opening as .
Key ARS Algorithms (LaTeX pseudocode given in the reference):
| Operation | Description | Output |
|---|---|---|
| ARS.Setup | Parameter generation (group, bases, ElGamal key) | |
| ARS.KeyGenOpener | Auditor opener key generation | |
| ARS.KeyGenUser | Admitter key generation | |
| ARS.Sign | Sign message for ring , auditor | Signature |
| ARS.Verify | Verify ring signature | $0/1$ |
| ARS.Open | Designated audit “open” | or |
| ARS.Judge | Verifies audit open proof | $0/1$ |
Pedersen commitment and open procedures also provided in pseudocode.
4. Protocol Workflow
Issuance:
- Admitter samples fresh and .
- Chooses ring of Admitter keys (size ), includes own .
- Selects Auditor index , publishes in the message.
- Constructs on-chain message :
- Computes .
- Sends to Token Submitter.
Revocation:
- To revoke, Admitter reveals corresponding to in a new signed message , uniquely linkable to the original issuance.
Blockchain Embedding:
- Token Submitter checks all validity conditions, then embeds using appropriate blockchain payload mechanism (e.g., OP_RETURN, smart contract data).
Verification:
- Token Verifiers extract and run .
Trace/Audit:
- Only the designated Auditor runs to extract , optionally publishing an opening proof for public judgment.
5. Security Arguments
TokenMark’s security derives strictly from its ARS and Pedersen primitives:
- Anonymity: Full anonymity of the ARS precludes adversarial identification of a signer within a ring, even in the presence of all other Admitter keys and non-designated opener keys. Pedersen commitment to does not leak information.
- Auditability: Traceability is enforced as with the correct opener key always retrieves the unique issuer. Non-frameability is ensured since the ARS prohibits constructing signatures openable to arbitrary keys.
- Unforgeability: The ARS unforgeability property ensures no adversary can create valid for an uncorrupted Admitter without .
- Revocability: Only the Admitter with opening of the commitment can successfully revoke, enforced by Pedersen binding and hiding.
6. Performance and Deployment Considerations
Implemented over Curve25519, TokenMark’s ARS and Pedersen operations feature:
- Ring size: .
- Signature size: .
- Timings (per operation, MacBook Pro, 2.3 GHz Intel i5):
- Sign:
- Verify:
- Commitment/Open:
On-chain footprint and costs:
| Blockchain | Full Embed | Hash+URL Embed |
|---|---|---|
| Bitcoin | 1.6 KB, BTC () | 2 outputs, $0.004$ BTC () |
| Ethereum | 46,888 gas, $0.0000938$ ETH () | — |
| NEM | 2 tx, $2.8$ XEM () | 1 tx, $0.007$–$0.009$ (€) |
These metrics demonstrate practical deployment on Ethereum and NEM; Bitcoin costs are higher and may be justified for high-value forensic marks.
7. Application Domain and Generality
TokenMark is universally applicable to any cryptocurrency supporting arbitrary transaction payloads, demonstrated on Bitcoin, Ethereum, and NEM. Its trust and audit overlay provide general mechanisms for marking, forensic attribution, and trust-support infrastructure, decoupled from core consensus rules or native token implementations. The protocol achieves equivalent or superior functionality to the Mosaic tagging approach for NEM, without centralizing linkability or exposing volunteer/issuer identities, thus offering a robust, privacy-preserving foundation for regulatory and community-driven address attribution (Sato et al., 2020).