AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
Article Link
Collect
Submit Manuscript
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Regular Paper

ShadowEth: Private Smart Contract on Public Blockchain

Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, Shanghai 200240, China
Cryptape Inc., Hangzhou 310007, China
Show Author Information

Abstract

Blockchain is becoming popular as a distributed and reliable ledger which allows distrustful parties to transact safely without trusting third parties. Emerging blockchain systems like Ethereum support smart contracts where miners can run arbitrary user-defined programs. However, one of the biggest concerns about the blockchain and the smart contract is privacy, since all the transactions on the chain are exposed to the public. In this paper, we present ShadowEth, a system that leverages hardware enclave to ensure the confidentiality of smart contracts while keeping the integrity and availability based on existing public blockchains like Ethereum. ShadowEth establishes a confidential and secure platform protected by trusted execution environment (TEE) off the public blockchain for the execution and storage of private contracts. It only puts the process of verification on the blockchain. We provide a design of our system including a protocol of the cryptographic communication and verification and show the applicability and feasibility of ShadowEth by various case studies. We implement a prototype using the Intel SGX on the Ethereum network and analyze the security and availability of the system.

Electronic Supplementary Material

Download File(s)
jcst-33-3-542-Highlights.pdf (184.5 KB)

References

[1]
Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker G, Savage S. A fistful of bitcoins: Characterizing payments among men with no names. In Proc. the Conf. Internet Measurement Conf., October 2013, pp.127-140.
[2]
Ron D, Shamir A. Quantitative analysis of the full bitcoin transaction graph. In Proc. the 17th International Conf. Financial Cryptography and Data Security, April 2013, pp.6-24.
[3]
Parno B, Howell J, Gentry C, Raykova M. Pinocchio: Nearly practical verifiable computation. In Proc. IEEE Symp. Security and Privacy, May 2013, pp.127-140.
[4]
Miers I, Garman C, Green M, Rubin A D. Zerocoin: Anonymous distributed E-cash from bitcoin. In Proc. IEEE Symp. Security and Privacy, May 2013, pp.397-411.
[5]
Kosba A, Miller A, Shi E, Wen Z K, Papamanthou C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proc. IEEE Symp. Security and Privacy, May 2016, pp.839-858.
[6]
Costan V, Devadas S. Intel SGX explained. IACR Cryptology ePrint Archive: Report 2016/086, 2016. http://eprint.iacr.org/, Mar. 2018.
[7]
Xu Y Z, Cui W D, Peinado M. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In Proc. IEEE Symp. Security and Privacy, May 2015, pp.640-656.
[8]
Shih M W, Lee S, Kim T, Peinado M. T-SGX: Eradicating controlled-channel attacks against enclave programs. In Proc. the Annual Network and Distributed System Security Symposium, March 2017.
[9]
Shinde S, Chua Z L, Narayanan V, Saxena P. Preventing page faults from telling your secrets: Defenses against pigeonhole attacks. In Proc. the 11th ACM on Asia Conf. Computer and Communications Security, May 2016, pp.317-328.
[10]
Lee S, Shih M W, Gera P, Kim T, Kim H, Peinado M. Inferring fine-grained control flow inside SGX enclaves with branch shadowing. In Proc. the 26th USENIX Security Symp., August 2017, pp.16-18.
[11]
Prisco G. Intel develops ‘Sawtooth Lake’ distributed ledger technology for the Hyperledger project. https://bitcoinmagazine.com/articles/intel-develops-sawtooth-lake-distributed-ledger-technology-for-the-hyperledger-project-1460397461/, Mar. 2018.
[12]
Zhang F, Cecchetti E, Croman K, Juels A, Shi E. Town crier: An authenticated data feed for smart contracts. In Proc. the 23rd ACM SIGSAC Conf. Computer and Communications Security, October 2016, pp.270-282.
[13]
Lind J, Eyal I, Pietzuch P, Sirer G S, Shi E. Teechan: Payment channels using trusted execution environments. arXiv preprint arXiv: 1612.07766, 2016. http://arxiv.org/abs/1612.07766, Mar. 2018.
[14]
Lind J, Eyal I, Kelbert F, Naor O, Pietzuch P, Sirer G S. Teechain: Scalable blockchain payments using trusted execution environments. arXiv preprint arXiv: 1707.05454, 2017. http://arxiv.org/abs/1707.05454, Mar. 2018.
Journal of Computer Science and Technology
Pages 542-556
Cite this article:
Yuan R, Xia Y-B, Chen H-B, et al. ShadowEth: Private Smart Contract on Public Blockchain. Journal of Computer Science and Technology, 2018, 33(3): 542-556. https://doi.org/10.1007/s11390-018-1839-y

333

Views

92

Crossref

N/A

Web of Science

96

Scopus

8

CSCD

Altmetrics

Received: 14 November 2017
Revised: 25 March 2018
Published: 11 May 2018
©2018 LLC & Science Press, China
Return