A Secure and Flexible Blockchain-Based Offline Payment Protocol

被引:9
作者
Jie, Wanqing [1 ,2 ]
Qiu, Wangjie [1 ,2 ,3 ]
Koe, Arthur Sandor Voundi [4 ,5 ]
Li, Jianhong [5 ]
Wang, Yin [5 ]
Wu, Yaqi [5 ]
Li, Jin [5 ]
机构
[1] Beihang Univ, Beijing Adv Innovat Ctr Future Blockchain & Privac, Beijing 100191, Peoples R China
[2] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Guangdong, Peoples R China
[3] Binzhou Med Univ, Hlth Blockchain Res Ctr, Yantai 264003, Shandong, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[5] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Guangdong, Peoples R China
关键词
Security; Blockchains; Smart contracts; Metadata; Threat modeling; Scalability; Forgery; Blockchain; offline payment; smart contract; security; flexible; protocol; WALLET;
D O I
10.1109/TC.2023.3331823
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Off-chain transactions seek to address the low on-chain scalability and enable blockchain-based payments over unreliable on-chain networks. The key problem with existing works is that they fail to balance security and flexibility in their designs. These studies would have been more useful if they could provide a sense of security without compromising their flexibility. We hypothesize that two offline parties having loosely synchronized clocks and channels with known bounded latency can conduct off-chain transactions while maintaining a high level of security and flexibility: we introduce a novel blockchain-based offline payment protocol that supports our hypothesis. Our work leverages on-chain smart contracts and offline wallet interactions to build resilience against intermittent on-chain connectivity. Our protocol achieves flexible and trusted computations with the use of platform-agnostic Trusted Execution Environments (TEEs) and open transactions. We empirically evaluate our design over the mainstream Intel Software Guard Extensions (SGX) and compare our protocol with state-of-the-art solutions. We found that our protocol attains high efficiency and exhibits an advanced level of security and flexibility in functionality. We evaluate our construction against several real-world attacks. We prove the security and robustness of our scheme based on a practical universally composable framework with synchronous settings. This work contributes to the existing knowledge of safe and user-friendly offline payment solutions for the blockchain technology.
引用
收藏
页码:408 / 421
页数:14
相关论文
共 41 条
[1]  
Anati I., 2013, PROC 2 INT WORKSHOPH, V13
[2]  
Bellagarda J. S., 2019, INPROC INT C INF RES, V2, P1
[3]  
Bertoni G., 2009, DAGSTUHL SEMINAR PRO
[4]  
Brown D. R. L., 2010, SEC 2: Recommended Elliptic Curve Domain Parameters
[5]  
Buterin V., 2014, Ethereum white paper, V3, P2
[6]  
Buterin Vitalik., GITHUB
[7]   iUC: Flexible Universal Composability Made Simple [J].
Camenisch, Jan ;
Krenn, Stephan ;
Kuesters, Ralf ;
Rausch, Daniel .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 :191-221
[8]   Universal Composition with Responsive Environments [J].
Camenisch, Jan ;
Enderlein, Robert R. ;
Krenn, Stephan ;
Kuesters, Ralf ;
Rausch, Daniel .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :807-840
[9]   Cryptography from sunspots: How to use an imperfect reference string [J].
Canetti, Ran ;
Pass, Rafael ;
Shelat, Abhi .
48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, :249-259
[10]   A Simpler Variant of Universally Composable Security for Standard Multiparty Computation [J].
Canetti, Ran ;
Cohen, Asaf ;
Lindell, Yehuda .
ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 :3-22