Authenticated Key Exchange over Bitcoin

被引:12
|
作者
McCorry, Patrick [1 ]
Shahandashti, Siamak F. [1 ]
Clarke, Dylan [1 ]
Hao, Feng [1 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Authenticated key exchange; Bitcoin; Diffie-Hellman; YAK;
D O I
10.1007/978-3-319-27152-1_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bitcoin is designed to protect user anonymity (or pseudonymity) in a financial transaction, and has been increasingly adopted by major e-commerce websites such as Dell, PayPal and Expedia. While the anonymity of Bitcoin transactions has been extensively studied, little attention has been paid to the security of post-transaction correspondence. In a commercial application, the merchant and the user often need to engage in follow-up correspondence after a Bitcoin transaction is completed, e.g., to acknowledge the receipt of payment, to confirm the billing address, to arrange the product delivery, to discuss refund and so on. Currently, such follow-up correspondence is typically done in plaintext via email with no guarantee on confidentiality. Obviously, leakage of sensitive data from the correspondence (e.g., billing address) can trivially compromise the anonymity of Bitcoin users. In this paper, we initiate the first study on how to realise end-to-end secure communication between Bitcoin users in a post-transaction scenario without requiring any trusted third party or additional authentication credentials. This is an important new area that has not been covered by any IEEE or ISO/IEC security standard, as none of the existing PKI-based or password-based AKE schemes are suitable for the purpose. Instead, our idea is to leverage the Bitcoin's append-only ledger as an additional layer of authentication between previously confirmed transactions. This naturally leads to a new category of AKE protocols that bootstrap trust entirely from the block chain. We call this new category "Bitcoin-based AKE" and present two concrete protocols: one is non-interactive with no forward secrecy, while the other is interactive with additional guarantee of forward secrecy. Finally, we present proof-of-concept prototypes for both protocols with experimental results to demonstrate their practical feasibility.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [1] Research on password-authenticated key exchange protocol over lattices
    Guo Y.
    Yin A.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (12): : 172 - 187
  • [2] Privacy-Preserving Authenticated Key-Exchange Over Internet
    Yao, Andrew Chi-Chih
    Zhao, Yunlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (01) : 125 - 140
  • [3] Unilaterally-Authenticated Key Exchange
    Dodis, Yevgeniy
    Fiore, Dario
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 542 - 560
  • [4] Credential Authenticated Identification and Key Exchange
    Camenisch, Jan
    Casati, Nathalie
    Gross, Thomas
    Shoup, Victor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 255 - 276
  • [5] Stronger security of authenticated key exchange
    LaMacchia, Brian
    Lauter, Kristin
    Mityagin, Anton
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 1 - +
  • [6] Lightweight Authenticated Key Exchange With EDHOC
    Vucinic, Malisa
    Selander, Goran
    Mattsson, John Preuss
    Watteyne, Thomas
    COMPUTER, 2022, 55 (04) : 94 - 100
  • [7] Authenticated key exchange with synchronized state
    Yang, Zheng
    Guo, Fei
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2373 - 2388
  • [8] Generic Compilers for Authenticated Key Exchange
    Jager, Tibor
    Kohlar, Florian
    Schaege, Sven
    Schwenk, Joerg
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 232 - 249
  • [9] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8
  • [10] Password Authenticated Key Exchange by Juggling
    Hao, Feng
    Ryan, Peter Y. A.
    SECURITY PROTOCOLS XVI, 2011, 6615 : 159 - +