Authenticated Key Exchange over Bitcoin

被引:12
|
作者
McCorry, Patrick [1 ]
Shahandashti, Siamak F. [1 ]
Clarke, Dylan [1 ]
Hao, Feng [1 ]
机构
[1] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Authenticated key exchange; Bitcoin; Diffie-Hellman; YAK;
D O I
10.1007/978-3-319-27152-1_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bitcoin is designed to protect user anonymity (or pseudonymity) in a financial transaction, and has been increasingly adopted by major e-commerce websites such as Dell, PayPal and Expedia. While the anonymity of Bitcoin transactions has been extensively studied, little attention has been paid to the security of post-transaction correspondence. In a commercial application, the merchant and the user often need to engage in follow-up correspondence after a Bitcoin transaction is completed, e.g., to acknowledge the receipt of payment, to confirm the billing address, to arrange the product delivery, to discuss refund and so on. Currently, such follow-up correspondence is typically done in plaintext via email with no guarantee on confidentiality. Obviously, leakage of sensitive data from the correspondence (e.g., billing address) can trivially compromise the anonymity of Bitcoin users. In this paper, we initiate the first study on how to realise end-to-end secure communication between Bitcoin users in a post-transaction scenario without requiring any trusted third party or additional authentication credentials. This is an important new area that has not been covered by any IEEE or ISO/IEC security standard, as none of the existing PKI-based or password-based AKE schemes are suitable for the purpose. Instead, our idea is to leverage the Bitcoin's append-only ledger as an additional layer of authentication between previously confirmed transactions. This naturally leads to a new category of AKE protocols that bootstrap trust entirely from the block chain. We call this new category "Bitcoin-based AKE" and present two concrete protocols: one is non-interactive with no forward secrecy, while the other is interactive with additional guarantee of forward secrecy. Finally, we present proof-of-concept prototypes for both protocols with experimental results to demonstrate their practical feasibility.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 50 条
  • [41] Enhanced Modelling of Authenticated Key Exchange Security
    Seye, Papa B.
    Sarr, Augustin P.
    SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 36 - 52
  • [42] Deniable Public-Key Authenticated Quantum Key Exchange
    van Wier, Jeroen
    Atashpendar, Arash
    Roenne, Peter
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, SECITC 2023, 2024, 14534 : 97 - 112
  • [43] Analysis of Two Authenticated Key Exchange Protocols
    Cheng, Qingfeng
    Hang, Guangguo
    Ma, Chuangui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +
  • [44] Fuzzy Password-Authenticated Key Exchange
    Dupont, Pierre-Alain
    Hesse, Julia
    Pointcheval, David
    Reyzin, Leonid
    Yakoubov, Sophia
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 393 - 424
  • [45] Threshold Password-Authenticated Key Exchange
    Philip MacKenzie
    Thomas Shrimpton
    Markus Jakobsson
    Journal of Cryptology, 2006, 19 : 27 - 66
  • [46] Achieving One-Round Password-Based Authenticated Key Exchange over Lattices
    Li, Zengpeng
    Wang, Ding
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 308 - 321
  • [47] Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication
    Krasnowski, Piotr
    Lebrun, Jerome
    Martin, Bruno
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 683 - 690
  • [48] Password authenticated key exchange protocol in electronic vehicle key enviromment
    Ming Y.
    Zou J.
    Shen T.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2021, 47 (04): : 698 - 705
  • [49] Authenticated Key Exchange under Bad Randomness, Revisited
    Cui, Hui
    Mudra, Glen
    MATHEMATICS, 2023, 11 (12)
  • [50] Authenticated Key Exchange Protocols Based on Factoring Assumption
    Huang, Hai
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37