用安全方法对微不足道加密货币协议进行形式分析

Q4 Mathematics CLEI Electronic Journal Pub Date : 2024-08-08 DOI:10.19153/cleiej.27.4.3
Adrián Silveira, Gustavo Betarte, C. Luna
{"title":"用安全方法对微不足道加密货币协议进行形式分析","authors":"Adrián Silveira, Gustavo Betarte, C. Luna","doi":"10.19153/cleiej.27.4.3","DOIUrl":null,"url":null,"abstract":"\n \n \nA cryptocurrency is a digital currency that enables online transactions for various products and services. Cryptocurrencies are deployed over public blockchains which have the transactions duplicated and dispersed across multiple nodes within a computer network. This decentralized mechanism is devised in order to achieve reliability in a network consisting of unreliable nodes. Privacy, anonymity and security have become crucial in this context. For that reason, formal and mathematical approaches are gaining popularity in order to guarantee the correctness of the cryptocurrency implementations. Mimblewimble is a privacy-oriented cryptocurrency technology which provides security and scalability properties that distinguish it from other protocols of its kind. Mimblewimble combines confidential transactions, CoinJoin and cut-through to achieve a higher level of privacy and security, as well as, scalability. In this work, we present and discuss these security properties and outline the basis of a model-driven verification approach to address the certification of the correctness of the protocol implementations. In particular, we propose an idealized model that is key in the described verification process. Then, we identify and precisely state the conditions for our model to ensure the verification of relevant security properties of Mimblewimble. In addition, we analyze the Grin and Beam implementations of Mimblewimble in their current state of development. We present detailed connections between our model and their implementations regarding the Mimblewimble structure and its security properties. Finally, we analyze the Litecoin soft-fork that enhances privacy over the blockchain based on Mimblewimble features. \n \n \n","PeriodicalId":30032,"journal":{"name":"CLEI Electronic Journal","volume":"33 6","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach\",\"authors\":\"Adrián Silveira, Gustavo Betarte, C. Luna\",\"doi\":\"10.19153/cleiej.27.4.3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n \\n \\nA cryptocurrency is a digital currency that enables online transactions for various products and services. Cryptocurrencies are deployed over public blockchains which have the transactions duplicated and dispersed across multiple nodes within a computer network. This decentralized mechanism is devised in order to achieve reliability in a network consisting of unreliable nodes. Privacy, anonymity and security have become crucial in this context. For that reason, formal and mathematical approaches are gaining popularity in order to guarantee the correctness of the cryptocurrency implementations. Mimblewimble is a privacy-oriented cryptocurrency technology which provides security and scalability properties that distinguish it from other protocols of its kind. Mimblewimble combines confidential transactions, CoinJoin and cut-through to achieve a higher level of privacy and security, as well as, scalability. In this work, we present and discuss these security properties and outline the basis of a model-driven verification approach to address the certification of the correctness of the protocol implementations. In particular, we propose an idealized model that is key in the described verification process. Then, we identify and precisely state the conditions for our model to ensure the verification of relevant security properties of Mimblewimble. In addition, we analyze the Grin and Beam implementations of Mimblewimble in their current state of development. We present detailed connections between our model and their implementations regarding the Mimblewimble structure and its security properties. Finally, we analyze the Litecoin soft-fork that enhances privacy over the blockchain based on Mimblewimble features. \\n \\n \\n\",\"PeriodicalId\":30032,\"journal\":{\"name\":\"CLEI Electronic Journal\",\"volume\":\"33 6\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"CLEI Electronic Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.19153/cleiej.27.4.3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"CLEI Electronic Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.19153/cleiej.27.4.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

摘要

加密货币是一种数字货币,可实现各种产品和服务的在线交易。加密货币部署在公共区块链上,公共区块链将交易复制并分散到计算机网络中的多个节点上。设计这种去中心化机制是为了在由不可靠节点组成的网络中实现可靠性。在这种情况下,隐私、匿名和安全变得至关重要。因此,为了保证加密货币实现的正确性,形式和数学方法越来越受欢迎。Mimblewimble 是一种以隐私为导向的加密货币技术,它所提供的安全性和可扩展性使其有别于其他同类协议。Mimblewimble 结合了保密交易、CoinJoin 和穿透技术,以实现更高水平的隐私和安全性以及可扩展性。在这项工作中,我们介绍并讨论了这些安全特性,并概述了模型驱动验证方法的基础,以解决协议实现的正确性认证问题。特别是,我们提出了一个理想化模型,它是所述验证过程的关键。然后,我们确定并精确阐述了模型的条件,以确保验证 Mimblewimble 的相关安全属性。此外,我们还分析了 Mimblewimble 的 Grin 和 Beam 实现的开发现状。我们详细介绍了我们的模型与它们的实现之间在 Mimblewimble 结构及其安全属性方面的联系。最后,我们分析了基于 Mimblewimble 功能增强区块链隐私的 Litecoin 软叉。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach
A cryptocurrency is a digital currency that enables online transactions for various products and services. Cryptocurrencies are deployed over public blockchains which have the transactions duplicated and dispersed across multiple nodes within a computer network. This decentralized mechanism is devised in order to achieve reliability in a network consisting of unreliable nodes. Privacy, anonymity and security have become crucial in this context. For that reason, formal and mathematical approaches are gaining popularity in order to guarantee the correctness of the cryptocurrency implementations. Mimblewimble is a privacy-oriented cryptocurrency technology which provides security and scalability properties that distinguish it from other protocols of its kind. Mimblewimble combines confidential transactions, CoinJoin and cut-through to achieve a higher level of privacy and security, as well as, scalability. In this work, we present and discuss these security properties and outline the basis of a model-driven verification approach to address the certification of the correctness of the protocol implementations. In particular, we propose an idealized model that is key in the described verification process. Then, we identify and precisely state the conditions for our model to ensure the verification of relevant security properties of Mimblewimble. In addition, we analyze the Grin and Beam implementations of Mimblewimble in their current state of development. We present detailed connections between our model and their implementations regarding the Mimblewimble structure and its security properties. Finally, we analyze the Litecoin soft-fork that enhances privacy over the blockchain based on Mimblewimble features.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CLEI Electronic Journal
CLEI Electronic Journal Computer Science-Computer Science (miscellaneous)
CiteScore
0.70
自引率
0.00%
发文量
18
审稿时长
40 weeks
期刊最新文献
Preface to the CLTM-CLTD 2023 Special Issue A Formal Analysis of the Mimblewimble Cryptocurrency Protocol with a Security Approach Monte Carlo Tree Search Algorithm for SSPs Under the GUBS Criterion Explainability Analysis of the Evaluation Model of the Level of Digital Transformation in MSMEs based on Fuzzy Cognitive Maps The JavaScript Package Selection Task: A Comparative Experiment Using an LLM-based Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1