Catena: Efficient Non-equivocation via Bitcoin
© 2017 IEEE. We present Catena, an efficiently-verifiable Bitcoinwitnessing scheme. Catena enables any number of thin clients, such as mobile phones, to efficiently agree on a log of application-specific statements managed by an adversarial server. Catenaimplements a log as an OP-RETURN transaction...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2021
|
Online Access: | https://hdl.handle.net/1721.1/137544 |
_version_ | 1826193860320034816 |
---|---|
author | Tomescu, Alin Devadas, Srinivas |
author2 | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
author_facet | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory Tomescu, Alin Devadas, Srinivas |
author_sort | Tomescu, Alin |
collection | MIT |
description | © 2017 IEEE. We present Catena, an efficiently-verifiable Bitcoinwitnessing scheme. Catena enables any number of thin clients, such as mobile phones, to efficiently agree on a log of application-specific statements managed by an adversarial server. Catenaimplements a log as an OP-RETURN transaction chain andprevents forks in the log by leveraging Bitcoin's security againstdouble spends. Specifically, if a log server wants to equivocate ithas to double spend a Bitcoin transaction output. Thus, Catenalogs are as hard to fork as the Bitcoin blockchain: an adversarywithout a large fraction of the network's computational powercannot fork Bitcoin and thus cannot fork a Catena log either. However, different from previous Bitcoin-based work, Catenadecreases the bandwidth requirements of log auditors from 90GB to only tens of megabytes. More precisely, our clients onlyneed to download all Bitcoin block headers (currently less than35 MB) and a small, 600-byte proof for each statement in a block. We implement Catena in Java using the bitcoinj library and use itto extend CONIKS, a recent key transparency scheme, to witnessits public-key directory in the Bitcoin blockchain where it can beefficiently verified by auditors. We show that Catena can securemany systems today, such as public-key directories, Tor directoryservers and software transparency schemes. |
first_indexed | 2024-09-23T09:46:09Z |
format | Article |
id | mit-1721.1/137544 |
institution | Massachusetts Institute of Technology |
language | English |
last_indexed | 2024-09-23T09:46:09Z |
publishDate | 2021 |
publisher | Institute of Electrical and Electronics Engineers (IEEE) |
record_format | dspace |
spelling | mit-1721.1/1375442022-09-26T13:37:10Z Catena: Efficient Non-equivocation via Bitcoin Tomescu, Alin Devadas, Srinivas Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory © 2017 IEEE. We present Catena, an efficiently-verifiable Bitcoinwitnessing scheme. Catena enables any number of thin clients, such as mobile phones, to efficiently agree on a log of application-specific statements managed by an adversarial server. Catenaimplements a log as an OP-RETURN transaction chain andprevents forks in the log by leveraging Bitcoin's security againstdouble spends. Specifically, if a log server wants to equivocate ithas to double spend a Bitcoin transaction output. Thus, Catenalogs are as hard to fork as the Bitcoin blockchain: an adversarywithout a large fraction of the network's computational powercannot fork Bitcoin and thus cannot fork a Catena log either. However, different from previous Bitcoin-based work, Catenadecreases the bandwidth requirements of log auditors from 90GB to only tens of megabytes. More precisely, our clients onlyneed to download all Bitcoin block headers (currently less than35 MB) and a small, 600-byte proof for each statement in a block. We implement Catena in Java using the bitcoinj library and use itto extend CONIKS, a recent key transparency scheme, to witnessits public-key directory in the Bitcoin blockchain where it can beefficiently verified by auditors. We show that Catena can securemany systems today, such as public-key directories, Tor directoryservers and software transparency schemes. 2021-11-05T16:47:32Z 2021-11-05T16:47:32Z 2017-05 2019-05-28T16:30:48Z Article http://purl.org/eprint/type/ConferencePaper https://hdl.handle.net/1721.1/137544 Tomescu, Alin and Devadas, Srinivas. 2017. "Catena: Efficient Non-equivocation via Bitcoin." en 10.1109/sp.2017.19 Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Institute of Electrical and Electronics Engineers (IEEE) MIT web domain |
spellingShingle | Tomescu, Alin Devadas, Srinivas Catena: Efficient Non-equivocation via Bitcoin |
title | Catena: Efficient Non-equivocation via Bitcoin |
title_full | Catena: Efficient Non-equivocation via Bitcoin |
title_fullStr | Catena: Efficient Non-equivocation via Bitcoin |
title_full_unstemmed | Catena: Efficient Non-equivocation via Bitcoin |
title_short | Catena: Efficient Non-equivocation via Bitcoin |
title_sort | catena efficient non equivocation via bitcoin |
url | https://hdl.handle.net/1721.1/137544 |
work_keys_str_mv | AT tomescualin catenaefficientnonequivocationviabitcoin AT devadassrinivas catenaefficientnonequivocationviabitcoin |