WI Is Not Enough: Zero -Knowledge Contingent (Service) Payments Revisited

被引:18
作者
Fuchsbauer, Georg [1 ]
机构
[1] Ecole Normale Super, CNRS, PSL, INRIA, Paris, France
来源
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) | 2019年
关键词
Zero-knowledge contingent payments; Bitcoin; zk-SNARKs; subversion zero knowledge; SECURITY;
D O I
10.1145/3319535.3354234
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While fair exchange of goods is known to be impossible without assuming a trusted party, smart contracts in cryptocurrencies forgo such parties by assuming trust in the currency system. They allow a seller to sell a digital good, which the buyer will obtain if and only if she pays. Zero-knowledge contingent payments (zkCP) show that, despite the limited expressiveness of its scripting language, this is even possible in Bitcoin by using zero-knowledge proofs. At CCS'17, Campanelli, Gennaro, Goldfeder and Nizzardo showed that the zkCP protocol was flawed, in that the buyer could obtain information about the good without paying. They proposed countermeasures to repair zkCP and moreover observed that zkCP cannot be used when a service is sold. They introduce the notion of ZK contingent payments for services and give an instantiation based on a witness-indistinguishable (WI) proof system. We show that the main countermeasures they proposed are not sufficient and present an attack against their fixed zkCP scheme. We also show that their realization of zkCP for services is insecure, as the buyer could learn the desired information (i.e., whether the service was provided) without paying; in particular, we show that WI of the used proof system is not enough.
引用
收藏
页码:49 / 62
页数:14
相关论文
共 39 条
[1]   A Subversion-Resistant SNARK [J].
Abdolmaleki, Behzad ;
Baghery, Karim ;
Lipmaa, Helger ;
Zajac, Michal .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 :3-33
[2]  
[Anonymous], 2019, HASH LOCKED T
[3]  
[Anonymous], 2014, White Paper
[4]   Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts [J].
Banasik, Waclaw ;
Dziembowski, Stefan ;
Malinowski, Daniel .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :261-280
[5]  
Bellare M, 1993, P 1 ACM C COMP COMM, P62, DOI [DOI 10.1145/168588.168596, 10.1145/168588.168596]
[6]  
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
[7]   NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion [J].
Bellare, Mihir ;
Fuchsbauer, Georg ;
Scafuro, Alessandra .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :777-804
[8]  
Bellare O., 1992, LNCS, V740, P390, DOI DOI 10.1007/3-540-48071-428
[9]  
Ben-Sasson E, 2014, LIBSNARK
[10]  
Ben-Sasson E, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P781