Bitcoin Covenants

被引:33
作者
Moeser, Malte [1 ]
Eyal, Ittay [2 ]
Sirer, Emin Gun [2 ]
机构
[1] Univ Munster, Dept Informat Syst, Munster, Germany
[2] Cornell Univ, Dept Comp Sci, Initiat Cryptocurrencies & Contracts IC3, Ithaca, NY 14853 USA
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016 | 2016年 / 9604卷
关键词
D O I
10.1007/978-3-662-53357-4_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an extension to Bitcoin's script language enabling covenants, a primitive that allows transactions to restrict how the value they transfer is used in the future. Covenants expand the set of financial instruments expressible in Bitcoin, and enable new powerful and novel use cases. We illustrate two novel security constructs built using covenants. The first, vaults, focuses on improving the security of private cryptographic keys. Historically, maintaining these keys securely and reliably has been a critical vulnerability for Bitcoin users. We show how covenants enable vaults, which disincentivize key theft by preventing an attacker from gaining full access to stolen funds. The second construct, poison transactions, is a generally useful mechanism for penalizing double-spending attacks. Bitcoin-NG, a protocol that has been recently proposed to improve Bitcoin's throughput, latency and overall scalability, requires this feature. We show how covenants enable poison transactions, and detail how Bitcoin-NG can be implemented progressively as an overlay on top of the Bitcoin blockchain.
引用
收藏
页码:126 / 141
页数:16
相关论文
共 20 条
[1]  
[Anonymous], 2015, NDSS WORKSH US SEC U
[2]  
[Anonymous], Enabling blockchain innovations with pegged sidechains
[3]  
[Anonymous], LNCS
[4]   SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies [J].
Bonneau, Joseph ;
Miller, Andrew ;
Clark, Jeremy ;
Narayanan, Arvind ;
Kroll, Joshua A. ;
Felten, Edward W. .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :104-121
[5]  
BtcDrak Friedenbach M., 2015, BIP 112 CHECKSEQUENC
[6]  
Buterin V, 2014, Slasher: A Punitive Proof-of-Stake Algorithm
[7]  
Buterin V., 2014, CISC VIS NETW IND GL, V3, P2, DOI [10.5663/aps.v1i1.10138, DOI 10.5663/APS.V1I1.10138]
[8]  
CHAUM D, 1990, LECT NOTES COMPUT SC, V403, P319
[9]  
d'aniel Todd P, 2013, SECURITY DEPOSITS
[10]  
Decker C., BITCOIN DEV BIP NORM