2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2019
DOI: 10.1109/bloc.2019.8751394
|View full text |Cite
|
Sign up to set email alerts
|

Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin

Abstract: We explore challenges of and present a concept for a decentralized payment service which is based on trusted execution environments. The system guarantees that users can always cash out their funds without depending on the cooperation of other network members, hence minimizing the trust required in other network members. We present an overview of the system, motivate key components for a secure architecture and provide a communication protocol. We prove that the payment service users can cash out their funds a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Obscuro utilises Intel's SGX system secure enclave to separate application data from the rest of the system. Grundmann et al [8] have called this and similar services of TEEs BANKLAVES. Examples include Tesserect, Teechain and Obscuro.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Obscuro utilises Intel's SGX system secure enclave to separate application data from the rest of the system. Grundmann et al [8] have called this and similar services of TEEs BANKLAVES. Examples include Tesserect, Teechain and Obscuro.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The benefit of TEEs is that they are created with the assumption that in the event of a compromised OS, the enclave is secure and separated from the attacker, barring side channel attacks. The work in [8] outline as one of the key security objectives of TEEs that they aim to keep user balances and their performed transactions confidential from curious attackers. Bentov et al in [9] created Tesseract based on the assumption that an adversary (potentially the exchange operator) can gain complete physical access to the host in which the funds are stored and complete control of its network connections.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They have also been used to implement a trusted exchange [5], second layer architectures (e.g. Teechain [14] and Banklaves [10]), and an extension to Bitcoin to run arbitrary smart contracts [7]. In this work, we present TEE Guard, which is, to the best of our knowledge, a new approach to use TEEs in the world of cryptocurrencies by leveraging their features to implement a watchtower service for payment channel networks.…”
Section: Blockchain and Teesmentioning
confidence: 99%