Protecting Access Privacy For Bitcoin Lightweight Client Using Trusted Hardware

2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC)(2019)

引用 2|浏览22
暂无评分
摘要
Through decentralized ledger, Bitcoin rebuilds trust and achieves payment verification. However, the verification of Bitcoin transactions requires nodes to download the whole blockchain, which is infeasible for resource-constraint devices. Traditional schemes tried to transfer most of the storage and computation tasks from a lightweight client to a full node. Nevertheless, these schemes would severely violate users' privacy since they would leak transaction ID and public-key address when a lightweight client queries the full node. To address this, we propose a privacy-preserving approach to secure queries of simplified payment verification (SPV) clients. Specifically, we design a d-differentially private mechanism based on trusted hardware such that semi-honest adversaries cannot acquire the real access pattern during shards retrieval phase. Data-oblivious primitives are adopted to prevent the internal search pattern leakage owing to side-channel attacks. Our scheme is more secure than traditional SPV schemes, and it is proved to satisfy d-differential privacy definition. Our prototype implementation with the Bitcoin blockchain dataset shows its practicality.
更多
查看译文
关键词
protecting access privacy,Bitcoin lightweight client,trusted hardware,decentralized ledger,Bitcoin transactions,resource-constraint devices,traditional schemes,transaction ID,public-key address,lightweight client queries,privacy-preserving approach,simplified payment verification clients,d-differentially private mechanism,access pattern,shards retrieval phase,data-oblivious primitives,internal search pattern leakage,traditional SPV schemes,d-differential privacy definition,Bitcoin blockchain dataset
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要