A Model-Driven Analysis of Mimblewimble Security Properties and its Protocol Implementations

被引:0
|
作者
Silveira, Adrian [1 ]
Betarte, Gustavo [1 ]
Cristia, Maximiliano [2 ,3 ]
Luna, Carlos [1 ]
机构
[1] Univ Republica, Fac Ingn, Montevideo, Uruguay
[2] CIFASIS, Rosario, Argentina
[3] Univ Nacl Rosario, Rosario, Argentina
来源
关键词
security; formal verification; mimblewimble; idealized model; cryptocurrency;
D O I
10.36561/ING.24.10
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Mimblewimble is a privacy-oriented cryptocurrency technology that provides security and scalability properties that distinguish it from other protocols. Mimblewimble's cryptographic approach is based on Elliptic Curve Cryptography which allows verifying a transaction without revealing any information about the transactional amount or the parties involved. Mimblewimble combines Confidential transactions, CoinJoin, and cut-through to achieve a higher level of privacy, security, and scalability. In this work, we present and discuss these security properties and outline the basis of a model-driven verification approach to address the certification of the correctness of the protocol implementations. In particular, we propose an idealized model that is key in the described verification process. Then, we identify and precisely state the conditions for our model to ensure the verification of relevant security properties of Mimblewimble. In addition, we analyze the Grin and Beam implementations of Mimblewimble in their current state of development. We present detailed connections between our model and their implementations regarding the Mimblewimble structure and its security properties.
引用
收藏
页码:129 / 142
页数:14
相关论文
共 50 条
  • [21] Model-Driven Performance Analysis
    Moreno, Gabriel A.
    Merson, Paulo
    QUALITY OF SOFTWARE ARCHITECTURES, PROCEEDINGS, 2008, 5281 : 135 - 151
  • [22] A Security Analysis Method for Security Protocol Implementations Based on Message Construction
    Lu, Jintian
    Yao, Lili
    He, Xudong
    Huang, Chintser
    Wang, Dejun
    Meng, Bo
    APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [23] Model-driven security management of embedded service systems
    Illner, S
    Pohl, A
    Krumm, H
    IECON 2005: THIRTY-FIRST ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, 2005, : 2655 - 2660
  • [24] Model-driven business process security requirement specification
    Wolter, Christian
    Menzel, Michael
    Schaad, Andreas
    Miseldine, Philip
    Meinel, Christoph
    JOURNAL OF SYSTEMS ARCHITECTURE, 2009, 55 (04) : 211 - 223
  • [25] Model-driven security engineering of service oriented systems
    Breu, Ruth
    Hafner, Michael
    Innerhofer-Oberperfler, Frank
    Wozak, Florian
    INFORMATION SYSTEMS AND E-BUSINESS TECHNOLOGIES, 2008, 5 : 59 - +
  • [26] Security Requirements Formalized with OCL in a Model-Driven Approach
    Borek, Marian
    Moebius, Nina
    Stenzel, Kurt
    Reif, Wolfgang
    2013 3RD INTERNATIONAL WORKSHOP ON MODEL-DRIVEN REQUIREMENTS ENGINEERING (MODRE), 2013, : 65 - 73
  • [27] OpenPMF: A model-driven security framework for distributed systems
    Lang, U
    Schreiner, R
    ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 138 - 147
  • [28] Enterprise security pattern: A model-driven architecture instance
    Moral-Garcia, Santiago
    Moral-Rubio, Santiago
    Fernandez, Eduardo B.
    Fernandez-Medina, Eduardo
    COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) : 748 - 758
  • [29] The significance of model-driven paradigms in cyber security: an introduction
    Kott, Alexander
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01): : 3 - 4
  • [30] A Fair Accountability Protocol and Its Security Properties Analysis
    Chen, Li
    Li, Huaiqiang
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3959 - 3962