RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments

被引:0
作者
Lee, Junmo [1 ]
Kim, Seongjun [1 ]
Park, Sanghyeon [1 ]
Moon, Soo-Mook [1 ]
机构
[1] Seoul Natl Univ, Seoul, South Korea
来源
2024 ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC | 2024年
关键词
blockchain; off-chain solution; trusted execution environment;
D O I
10.1109/ACSAC63791.2024.00048
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a trusTEE-chain, a highly scalable payment system on a centralized host with trusted execution environments (TEEs) that can provide confidentiality and integrity. Our implementation of trusTEE-chain called RouTEE is an open-sourced TEE application which can provide a unified solution for the existing issues of payment systems. That is, although RouTEE is run by a host, its data including payment details can be concealed from the host. Also, RouTEE does not require its own collateral, but receives deposits from users and makes payments. Users do not have to verify the whole blockchain but only the block headers asynchronously, and they can go indefinitely offline without worrying about financial losses. Finally, RouTEE is highly scalable since its payment throughput is limited only by the TEE performance. Although TEEs can simplify the solution, TEEs alone are not enough because the host can possibly misbehave by feeding fake blocks to RouTEE or aborting its operation. By introducing a novel protocol and incentive model, RouTEE makes a rational host behave honestly. We also propose solutions for fault failures, compromised TEEs, and irrational hosts. RouTEE works for any UTXO-based blockchain and requires only the digital signatures, thus highly portable. Our implementation of RouTEE using Intel SGX on Bitcoin shows that RouTEE achieves a high throughput even with frequent data backups, for more than 150K users.
引用
收藏
页码:456 / 472
页数:17
相关论文
共 47 条
[1]   OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX [J].
Ahmad, Adil ;
Joe, Byunggill ;
Xiao, Yuan ;
Zhang, Yinqian ;
Shin, Insik ;
Lee, Byoungyoung .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[2]  
Alves T., 2004, Inf. Q., V3, P18
[3]   Bitcoin-Compatible Virtual Channels [J].
Aumayr, Lukas ;
Maffei, Matteo ;
Ersoy, Oguzhan ;
Erwig, Andreas ;
Faust, Sebastian ;
Riahi, Siavash ;
Hostakova, Kristina ;
Moreno-Sanchez, Pedro .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2021, :901-918
[4]   Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware [J].
Bentov, Iddo ;
Ji, Yan ;
Zhang, Fan ;
Breidenbach, Lorenz ;
Daian, Philip ;
Juels, Ari .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1521-1538
[5]   Detecting Privileged Side-Channel Attacks in Shielded Execution with Deja Vu [J].
Chen, Sanchuan ;
Zhang, Xiaokuan ;
Reiter, Michael K. ;
Zhang, Yinqian .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :7-18
[6]   Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts [J].
Cheng, Raymond ;
Zhang, Fan ;
Kos, Jernej ;
He, Warren ;
Hynes, Nicholas ;
Johnson, Noah ;
Juels, Ari ;
Miller, Andrew ;
Song, Dawn .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, :185-200
[7]  
Costan V., 2016, Cryptol. ePrint Arch.
[8]  
Das P, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P801
[9]   Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [J].
Dong, Changyu ;
Wang, Yilei ;
Aldweesh, Amjad ;
McCorry, Patrick ;
van Moorsel, Aad .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :211-227
[10]  
Dotan M., 2022, 31 USENIX SEC S USEN