Tomescu, Alin, and Srinivas Devadas. “Catena: Efficient nonequivocation via bitcoin.” 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017.

A. Problem Statement

The paper targets the problem of new encryption method based on the blockchain. Particularly, how Catena uses Bitcoin’s underlying blockchain technology to prevent identity theft and encryption attacks?

B. Problem Significance

Blockchain and cryptocurrency technologies are not yet mature. There are still some initial problems and weaknesses in practice, and they lack a wide range of applications, which Catena accelerate the development of the technology and provide an extended test base for new technology solutions.
Specializing in blockchain-based cryptocurrency technology, it is expected to advance the significant development of cryptocurrencies and blockchains. At the same time, Catena also assumed the role of promotion of cryptocurrency. Catena completes the ambiguity elimination of encryption technology according to the bitcoin blockchain. Here, it is a very important issue to say different things to different organizations and bring more secure algorithms.

C. State of the Art

Bitcoin blockchains are immutable and decentralized in nature. To change the data set implemented by the Bitcoin blockchain, you need to break and modify the entire
distributed ledger. Therefore, it is impossible to attack and modify the integrated data set in the Bitcoin block. A key element of Catena’s system is that it does not record all public keys that are authenticated by the public key cryptosystem. Bitcoin transactions provide space for an 80-character text comment, but this is not enough to store all public keys. However, this can be used to store cryptographic signatures associated with these public keys.
Catena - just added to record the public statement each bitcoin transaction must involve the actual bitcoin transfer requirements. The user can simply transfer the bitcoin to himself, but this eliminates the possibility of transferring bitcoin to anyone else in the same block of the blockchain. Therefore, it also excludes equivocation within the block. In order to prevent equivocation between blocks, it is still necessary to confirm that the bitcoin that the Catena user spends in one block is the same as the bitcoin it spent last public assertion. But again, because the ability to verify the Bitcoin chain of custody is critical to the success of the entire Bitcoin system, it’s relatively easy. People who want to use Catena to audit all public assertions for a given Web service still need to download information from each block of the blockchain. But they only need to download a small encryption certificate for each block - about 600 bytes - instead of the full megabyte data of the block.
The Catena design concept has a log server, a client and a Header Relay Network (HRN). First, Catena uses Bitcoin blockchain technology and can reduce downloads because there is no need to download irrelevant content, using Merkle’s root to ensure non-equivocation. Catena ensures Key transparency, which prevents Man-in-the-middle (MITM) attacks. At the same time, Blockchain-based transparency can replace Bloom filtering, which means you can use Catena to track the Blockstack operations mentioned in the previous article. Software transparency can help us reject malware binary files. At the same time, Catena can also anonymize users in Tor. Moreover, Catena agrees on the collection of fees, which is fixed, so as to avoid one party opening a high price and generating a monopoly.
Back to the log server is the main role in Catena, but also plays a role in expanding the number of customers, spreading transactions and embedding them in Bitcoin’s P2P network. Because the HRN and P2P networks are connected, the customer usually confirms by querying the HRN. This avoids using too many Bitcoin P2P networks. Just taking the block header can also make the auditing cost very low. Catena checks each statement and can trace back to the genesis transaction.

D. Contributions

This paper proposes how the unchangeable blockchain of Bitcoin can be used to protect data for individuals and corporate organizations. Catena can be used by any service or application that wants to prove the linear history of its statements to its customers.
Essentially, the MIT research team’s cryptographic attack defence method uses a bitcoin-based detection system that sends a network alert if an erroneous encryption key wants to cancel the real encryption key. During the encryption attack, the attacker breaks into a public key encryption system and proves that a wrong encryption key is used to convince the user to disclose confidential information. By using this encryption key, an attacker can break through the system and steal sensitive data and valuable information. The problem with this type of encryption attack is that the wrong encryption key cannot cancel the real encryption key without triggering the system alarm. Usually, the system will have two encryption keys. In this way, the system and the user will not know if the real encryption key is being used to extract information.
This paper and the system developed by his MIT research team used the bitcoin public blockchain to solve this ambiguous problem of cryptographic attacks. Using Bitcoin’s unchangeability, Catena is a way to prevent online service attack spoofing and use incorrect encryption keys. Using Bitcoin will allow the system to prevent identity theft, and Catena will be implemented on a commercial scale, which could help large companies save millions of dollars a year. The paper is about using bitcoin to protect network services from fraud. When you are creating a distributed system and these systems will send digital signatures to each other, for example, these systems may be destroyed, and they may lie. They may say different things to different people. Catena prevents this. The Catena outlined in the paper is a practical idea that can be easily used and implemented. The abstract concept articulated in this paper is really a good idea—an idea that creates a smaller blockchain or linked list in a blockchain, specific to an account or purpose. It’s very cool, very good, easy to use, and clear.

E. Remaining Questions

Catena architecture is above Bitcoin, and various features are also dependent on Bitcoin. Possible attacks are also attacking against Bitcoin. If Bitcoin forks have problems, is Catena facing a crash?

读书笔记(六)--Catena相关推荐

  1. 3d游戏设计读书笔记六

    3d游戏设计读书笔记六 一.改进飞碟(Hit UFO)游戏: 游戏内容要求: 按 adapter模式 设计图修改飞碟游戏 使它同时支持物理运动与运动学(变换)运动 更改原 UFO_action 类 为 ...

  2. Android驱动开发读书笔记六

    第六章 Linux 驱动的工作和访问方式是 Linux 的亮点之一,Linux 系统将每一个驱动都映射成一个文件.这些文件称为设备文件或驱动文件,都保存在/dev目录中,由于大多数Linux驱动都有与 ...

  3. C专家编程--读书笔记六 运行时数据结构

    第六章 一.知识点 1.代码和数据的区别也可以认为是编译时和运行时的分界线.编译器的绝大部分工作都跟翻译代码有关:必要的数据存储管理的绝大部分都在运行时进行.(P121) 2."a.out& ...

  4. 《七步掌握业务分析》读书笔记六

    分析技术和呈现格式 词汇表 强有力沟通的一个重要内容是一致地使用术语和惯用语.每次谈话都涉及对术语的共同理解. 工作流图(也称为流程图.UNL活动图和过程图) 工作流程把一个或多个业务过程的细节可视化 ...

  5. 你不知道的javaScript读书笔记(六)

    this全面解析 笔记: this的运行机制: (1) this是在运行时绑定的,并不是在编写时绑定,它的上下文取决于函数调用时的各种条件.this的绑定和函数声明的位置没有任何关系,只取决于函数的调 ...

  6. 《编码:隐匿在计算机软硬件背后的语言(美)》读书笔记六

    数字计算机中的存储器唯一可以存储的是比特. 所有由符号和字母表示的数字都需要编码.具有这种功能的系统被称为字符编码集(Coded Character Set),系统内的每个独立编码称为字符编码(Cha ...

  7. 《深入理解计算机系统》读书笔记六:整数表示

    32位程序上的C语言整型数据类型的典型取值范围如下: 64位程序上的C语言整型数据类型的典型取值范围如下: 无符号数的编码: 无符号数编码的唯一性 补码编码 补码编码的唯一性 补码的取值范围是不对称的 ...

  8. Effective Java读书笔记六:方法

    第38条:检查参数的有效性 绝大多数方法和构造器对于传递给它们的参数值都会有些限制.比如,索引值必须大于等于0,且不能超过其最大值,对象不能为null等.这样就可以在导致错误的源头将错误捕获,从而避免 ...

  9. 《Go语言程序设计》读书笔记(六) 基于共享变量的并发

    竞争条件 在一个线性(就是说只有一个goroutine的)的程序中,程序的执行顺序只由程序的逻辑来决定.在有两个或更多goroutine的程序中,每一个goroutine内的语句也是按照既定的顺序去执 ...

  10. Head First设计模式读书笔记六 第七章下 外观模式

    本文示例代码材料源自Head First设计模式 以前整理自己整理的链接: https://blog.csdn.net/u011109881/article/details/59153772 简介 H ...

最新文章

  1. hibernate分页
  2. 西部开源学习笔记BOOK2-《unit 4》
  3. 数据中台应用实战50篇(一)-企业级数据中台的建设方法架构和技术栈
  4. 区块链BaaS云服务(19)趣链Hyperchain
  5. 埃氏筛秒素数题(洛谷P5723题题解,Java语言描述)
  6. [转]MVC+JQuery validate实现用户输入验证
  7. 全球首例无人车撞人致死事故判决:Uber无罪,安全员要进一步调查
  8. SAP-MM MRP类型详解
  9. Sopcast软件中凤凰卫视频道列表代码
  10. 用户画像中常用的用户模型
  11. 小米root以及面具的使用
  12. 大量数据导出Excel 之 多重影分身之术 [转]
  13. 大厂纷纷押宝“元宇宙”“鸡肋”智能眼镜难成密钥
  14. MySQL_11_范式优化
  15. Centos7 安装Nexus
  16. 腾讯优测-优社区干货精选 | android开发在路上:少去踩坑,多走捷径(上)
  17. 端口被占用,简单快捷的解决方法
  18. (11)3DMAX之多边形建模的基本认识、多边形修改器和转换为多边形的区别、认识编辑多边形子层级、编辑多边形功能命令快捷方式
  19. OpenFOAM无反射边界条件源码学习
  20. Crops and livestock products世界各国农作物和牲畜产品产量1961-2021

热门文章

  1. 【Flutter】Text的使用
  2. ISA防火墙的默认系统策略和防火墙设置
  3. 2018结构、流体、热分析、多物理场耦合、电磁仿真计算特点与硬件配置方案分析
  4. Git 各种操作命令详细清单
  5. 深圳软件测试培训:测试当中用到的性能指标
  6. 旋转动画(360度一直转)
  7. 【ECharts系列|03可视化大屏】大数据管理平台实时展示
  8. 密码加密技术(MD5)
  9. C#按行读取、写入txt文件
  10. 一键启动u盘的快捷键查询表