skip to main content
10.1145/3052973.3052980acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation

Published:02 April 2017Publication History

ABSTRACT

Bitcoin seems to be the most successful cryptocurrency so far given the growing real life deployment and popularity. While Bitcoin requires clients to be online to perform transactions and a certain amount of time to verify them, there are many real life scenarios that demand for offline and immediate payments (e.g., mobile ticketing, vending machines, etc). However, offline payments in Bitcoin raise non-trivial security challenges, as the payee has no means to verify the received coins without having access to the Bitcoin network. Moreover, even online immediate payments are shown to be vulnerable to double-spending attacks. In this paper, we propose the first solution for Bitcoin payments, which enables secure payments with Bitcoin in offline settings and in scenarios where payments need to be immediately accepted. Our approach relies on an offline wallet and deploys several novel security mechanisms to prevent double-spending and to verify the coin validity in offline setting. These mechanisms achieve probabilistic security to guarantee that the attack probability is lower than the desired threshold. We provide a security and risk analysis as well as model security parameters for various adversaries. We further eliminate remaining risks by detection of misbehaving wallets and their revocation.

We implemented our solution for mobile Android clients and instantiated an offline wallet using a microSD security card. Our implementation demonstrates that smooth integration over a very prevalent platform (Android) is possible, and that offline and online payments can practically co-exist. We also discuss alternative deployment approach for the offline wallet which does not leverage secure hardware, but instead relies on a deposit system managed by the Bitcoin network.

References

  1. Android Bitcoin wallet. https://play.google.com/store/apps/details?id=de.schildbach.wallet.Google ScholarGoogle Scholar
  2. Apple Pay payment solution. http://www.apple.com/apple-pay/.Google ScholarGoogle Scholar
  3. Average electricity prices around the world: USD/kWh. https://www.ovoenergy.com/guides/energy-guides/average-electricity-prices-kwh.html.Google ScholarGoogle Scholar
  4. Bitcoin contracts. https://en.bitcoin.it/.Google ScholarGoogle Scholar
  5. Blockchain taking years to download? http://www.reddit.com/r/Bitcoin/comments/1pssvp/blockchain_taking_years_to_download/.Google ScholarGoogle Scholar
  6. DOGE. http://dogecoin.com.Google ScholarGoogle Scholar
  7. Google Wallet: Shop. Save. Pay. With your phone.Google ScholarGoogle Scholar
  8. Greenaddress. https://greenaddress.it/en/.Google ScholarGoogle Scholar
  9. LTC. http://litecoin.org.Google ScholarGoogle Scholar
  10. The NIST authenticated NTP service. http://www.nist.gov/pml/div688/grp40/auth-ntp.cfm.Google ScholarGoogle Scholar
  11. Coinblesk, a mobile bitcoin payment solution, 2014. https://github.com/coinblesk.Google ScholarGoogle Scholar
  12. Edgar Dunn & Company. Advanced payments report, 2014. http://www.paymentscardsandmobile.com/wp-content/uploads/2014/02/PCM_EDC_Advanced_Payments_Report_2014_MWC.pdf.Google ScholarGoogle Scholar
  13. 10 best payment processors for Bitcoin for merchants, 2016. https://toughnickel.com/personal-finance/Best-Payment-Processors-for-Bitcoin-Bitcoin-for-Merchants.Google ScholarGoogle Scholar
  14. T. Alves and D. Felton. TrustZone: Integrated hardware and software security. Information Quaterly, 3(4), 2004.Google ScholarGoogle Scholar
  15. E. Androulaki, G. Karame, M. Roeschlin, T. Scherer, and S. Capkun. Evaluating user privacy in Bitcoin. In Financial Cryptography and Data Security, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  16. M. Babaioff, S. Dobzinski, S. Oren, and A. Zohar. On Bitcoin and red balloons. In ACM Conference on Electronic Commerce, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Bamert, C.Decker, L. Elsen, R. Wattenhofer, and S. Welten. Have a snack, pay with Bitcoins. In 13-th IEEE International Conference on Peer-to-Peer Computing, 2013.Google ScholarGoogle Scholar
  18. T. Bamert, C. Decker, R. Wattenhofer, and S. Welten. BlueWallet: the secure Bitcoin wallet. In International Workshop on Security and Trust Management, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  19. L. Bångens and B. Söderberg. Mobile banking -- financial services for the unbanked 2008. http://spidercenter.org/polopoly_fs/1.146036.1378747792!/menu/standard/file/Mobile%20banking%20-%20financial%20services%20for%20the%20unbanked.pdf.Google ScholarGoogle Scholar
  20. S. Barber, X. Boyen, E. Shi, and E. Uzun. Bitter to better -- how to make Bitcoin a better currency. In Financial Cryptography and Data Security, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  21. E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. Zerocash: Practical decentralized anonymous e-cash from Bitcoin. In IEEE Symposium on Security and Privacy, May 2014.Google ScholarGoogle Scholar
  22. J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten. Research perspectives and challenges for Bitcoin and cryptocurrencies. In IEEE Symposium on Security and Privacy, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J.-P. Buntinx. 27 million more merchants can now accept Bitcoin, 2016. https://news.bitcoin.com/bitpay-enables-27-million-ingenico-retailers-accept-bitcoin/.Google ScholarGoogle Scholar
  24. V. Buterin. A next-generation smart contract and decentralized application platform, 2014. https://github.com/ethereum/wiki/wiki/White-Paper.Google ScholarGoogle Scholar
  25. Certgate. Certgate products. cgCard. Texas Instruments White Paper, 2012. http://www.certgate.com/wp-content/uploads/2012/09/20131113_cgCard_Datasheet_EN.pdf .Google ScholarGoogle Scholar
  26. D. Chaum. Blind signatures for untraceable payments. In Advances in cryptology, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  27. D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, E. G. Sirer, D. Song, and R. Wattenhofer. On scaling decentralized blockchains (a position paper). In Bitcoin Workshop, 2016.Google ScholarGoogle Scholar
  29. A. Cuthbertson. Bitcoin now accepted by 100,000 merchants worldwide. http://www.ibtimes.co.uk/bitcoin-now-accepted-by-100000-merchants-worldwide-1486613.Google ScholarGoogle Scholar
  30. G. Danezis, C. Fournet, M. Kohlweiss, and B. Parno. PinocchioCoin: building Zerocoin from a succinct pairing-based proof system. In PETShop, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. C. Decker and R. Wattenhofer. Information propagation in the Bitcoin network. In IEEE International Conference on Peer-to-Peer Computing, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  32. C. Decker and R. Wattenhofer. A fast and scalable payment network with Bitcoin duplex micropayment channels. In Stabilization, Safety, and Security of Distributed Systems, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. A. D. Donet, C. Perez-Sola, and J. Herrera-Joancomart. The Bitcoin P2P network. In Financial Cryptography and Data Security, 2014.Google ScholarGoogle Scholar
  34. R. Dragomirescu. OtherCoin. 2013. http://www.othercoin.com/OtherCoin.pdf.Google ScholarGoogle Scholar
  35. I. Eyal and E. G. Sirer. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security, 2014.Google ScholarGoogle Scholar
  36. J. Garay, A. Kiayias, and N. Leonardos. The Bitcoin backbone protocol: Analysis and applications. In Advances in Cryptology - EUROCRYPT, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  37. C. Garman, M. Green, and I. Miers. Decentralized anonymous credentials. In Network and Distributed System Security Symposium, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  38. A. Gervais, G. Karame, S. Capkun, and V. Capkun. Is bitcoin a decentralized currency? In IEEE Security and Privacy, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  39. Giesecke & Devrient Secure Flash Solutions. The Mobile Security Card SE 1.0 offers increased security. http://www.gd-sfs.com/the-mobile-security-card/mobile-security-card-se-1-0/.Google ScholarGoogle Scholar
  40. N. Gura, A. Patel, and A. Wander. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Workshop on Cryptographic Hardware and Embedded Systems (CHESS), 2004.Google ScholarGoogle ScholarCross RefCross Ref
  41. E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse attacks on Bitcoin's peer-to-peer network. In USENIX Security Symposium, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. G. O. Karame, E. Androulaki, and S. Capkun. Double-spending attacks on fast payments in Bitcoin. ACM Conference on Computer and Communications Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. S. King. Primecoin: Cryptocurrency with prime number proof-of-work, 2013. http://academictorrents.com/details/d0f9accaec8ac9d538fdf9d675105ae1392ea32b.Google ScholarGoogle Scholar
  44. J. A. Kroll, I. C. Davey, and E. W. Felten. The economics of Bitcoin mining or, Bitcoin in the presence of adversaries. Workshop on the Economics of Information Security, 2013.Google ScholarGoogle Scholar
  45. F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In International Workshop on Hardware and Architectural Support for Security and Privacy, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage. A fistful of Bitcoins: characterizing payments among men with no names. In Conference on Internet Measurement Conference, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. I. Miers, C. Garman, M. Green, and A. D. Rubin. Zerocoin: Anonymous distributed e-cash from Bitcoin. In IEEE Symposium on Security and Privacy, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. A. Miller and J. LaViola. Anonymous Byzantine consensus from moderately-hard puzzles: A model for Bitcoin. Technical Report CS-TR-14-01, University of Central Florida, April 2014.Google ScholarGoogle Scholar
  49. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Technical Report, 2008. http://www.vsewiki.cz/images/archive/8/89/20110124151146!Bitcoin.pdf .Google ScholarGoogle Scholar
  50. M. Palatinus and P. Rusnak. Trezor, 2013. www.bitcointrezor.com.Google ScholarGoogle Scholar
  51. D. Ron and A. Shamir. Quantitative analysis of the full Bitcoin transaction graph. Financial Cryptography and Data Security, 2012.Google ScholarGoogle Scholar
  52. M. Rosenfel. Analysis of hashrate-based double-spending. In ArXiv Preprint: 1402.2009v1, 2012. http://arxiv.org/abs/1402.2009.Google ScholarGoogle Scholar
  53. S. Skorobogatov. Chapter 7: Physical attacks and tamper resistance. In Introduction to Hardware Security and Trust. Springer New York, 2012.Google ScholarGoogle Scholar
  54. F. Tschorsch and B. Scheuermann. Bitcoin and beyond: A technical survey on decentralized digital currencies. In Cryptology ePrintArchive,Report2015/464, 2015.Google ScholarGoogle Scholar
  55. N. van Saberhagen. Cryptonote v 2.0, 2013. https:// cryptonote.org/whitepaper.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
            April 2017
            952 pages
            ISBN:9781450349444
            DOI:10.1145/3052973

            Copyright © 2017 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 April 2017

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            ASIA CCS '17 Paper Acceptance Rate67of359submissions,19%Overall Acceptance Rate418of2,322submissions,18%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader