2019
DOI: 10.1007/978-3-030-29959-0_18
|View full text |Cite
|
Sign up to set email alerts
|

Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification

Abstract: We study protocols that rely on a public ledger infrastructure, concentrating on protocols for zero-knowledge contingent payment, whose security properties combine diverse notions of fairness and privacy. We argue that rigorous models are required for capturing the ledger semantics, the protocol-ledger interaction, the cryptographic primitives and, ultimately, the security properties one would like to achieve. Our focus is on a particular level of abstraction, where network messages are represented by a term a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(22 citation statements)
references
References 42 publications
0
22
0
Order By: Relevance
“…If Alice does not publish her transaction before T 2 elapses, then the swap is canceled. c) Zero-knowledge contingent payments: These [16], [17], [18], [19], [20] are transactions allowing Bob to purchase a secret from Alice such that he learns the secret if and only if the payment is performed.…”
Section: Htlc-spec Usagementioning
confidence: 99%
See 1 more Smart Citation
“…If Alice does not publish her transaction before T 2 elapses, then the swap is canceled. c) Zero-knowledge contingent payments: These [16], [17], [18], [19], [20] are transactions allowing Bob to purchase a secret from Alice such that he learns the secret if and only if the payment is performed.…”
Section: Htlc-spec Usagementioning
confidence: 99%
“…A variety of more elaborate smartcontract designs rely on HTLC as a building block ( §II). These include high-frequency payment channels [4], [5], [6], [7], [8], [9], [10], atomic swaps [11], [12], [13], [14], [15], contingent payments [16], [17], [18], [19], [20], and cryptocurrency vaults [21], [22], [23], [24]. We identify the specification required by the variety of contracts using HTLC and call it HTLC-Spec.…”
Section: Introductionmentioning
confidence: 99%
“…Security definitions for ZKCP and security proofs for this protocol have been proposed both in the symbolic [18] and in the computational model [60]. However, there are still several drawbacks in practice.…”
Section: Introductionmentioning
confidence: 99%
“…We improve the ZKCP symbolic security definition from [18], making it amenable to automation, since their property cannot be fully verified with tools like Tamarin. We also make it more general, as the receiver property from [18] needs to be adapted according to the structure of the protocol. Finally, we also make it stronger.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation