Authenticated Key Exchange over Bitcoin

被引:12
|
作者
McCorry, Patrick [1 ]
Shahandashti, Siamak F. [1 ]
Clarke, Dylan [1 ]
Hao, Feng [1 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Authenticated key exchange; Bitcoin; Diffie-Hellman; YAK;
D O I
10.1007/978-3-319-27152-1_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bitcoin is designed to protect user anonymity (or pseudonymity) in a financial transaction, and has been increasingly adopted by major e-commerce websites such as Dell, PayPal and Expedia. While the anonymity of Bitcoin transactions has been extensively studied, little attention has been paid to the security of post-transaction correspondence. In a commercial application, the merchant and the user often need to engage in follow-up correspondence after a Bitcoin transaction is completed, e.g., to acknowledge the receipt of payment, to confirm the billing address, to arrange the product delivery, to discuss refund and so on. Currently, such follow-up correspondence is typically done in plaintext via email with no guarantee on confidentiality. Obviously, leakage of sensitive data from the correspondence (e.g., billing address) can trivially compromise the anonymity of Bitcoin users. In this paper, we initiate the first study on how to realise end-to-end secure communication between Bitcoin users in a post-transaction scenario without requiring any trusted third party or additional authentication credentials. This is an important new area that has not been covered by any IEEE or ISO/IEC security standard, as none of the existing PKI-based or password-based AKE schemes are suitable for the purpose. Instead, our idea is to leverage the Bitcoin's append-only ledger as an additional layer of authentication between previously confirmed transactions. This naturally leads to a new category of AKE protocols that bootstrap trust entirely from the block chain. We call this new category "Bitcoin-based AKE" and present two concrete protocols: one is non-interactive with no forward secrecy, while the other is interactive with additional guarantee of forward secrecy. Finally, we present proof-of-concept prototypes for both protocols with experimental results to demonstrate their practical feasibility.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [21] Password-Based Authenticated Key Exchange
    Pointcheval, David
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 390 - 397
  • [22] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [23] Location-Enhanced Authenticated Key Exchange
    Portnoi, Marcos
    Shen, Chien-Chung
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,
  • [24] Fuzzy Authenticated Key Exchange with Tight Security
    Jiang, Mingming
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 337 - 360
  • [25] An novel anonymous authenticated and key exchange protocol
    Cui, Hui
    Cao, Tianjie
    Journal of Networks, 2009, 4 (10) : 985 - 992
  • [26] Attribute-Based Authenticated Key Exchange
    Gorantla, M. Choudary
    Boyd, Colin
    Nieto, Juan Manuel Gonzalez
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 300 - 317
  • [27] Analysis and Improvement of an Authenticated Key Exchange Protocol
    Pan, Jiaxin
    Wang, Libin
    Ma, Changshe
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 417 - 431
  • [28] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [29] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [30] Authenticated key exchange protocol with selectable identities
    Guo, Hua
    Mu, Yi
    Zhang, Xiyong
    Li, Zhoujun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 226 - 239