skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems
In this paper, we study efficient and authorized rewriting of transactions already written to a blockchain. Mutable transactions will make a fraction of all blockchain transactions, but will be a necessity to meet the needs of privacy regulations, such as the General Data Protection Regulation (GDPR). The state-of-the-art rewriting approaches have several shortcomings, such as being coarse-grained, inability to expunge data, absence of revocation mechanisms, lack of user anonymity, and inefficiency. We present ReTRACe, an efficient framework for transaction-level blockchain rewrites, that is fine-grained and supports revocation. ReTRACe is designed by composing a novel revocable chameleon hash with ephemeral trapdoor scheme, a novel revocable fast attribute based encryption scheme, and a dynamic group signature scheme. We discuss ReTRACe, and its constituent primitives in detail, along with their security analyses, and present experimental results to demonstrate scalability.  more » « less
Award ID(s):
2028797 1914635 1800088
PAR ID:
10289218
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies (SACMAT)
Page Range / eLocation ID:
103 to 114
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Quantum information can be used to achieve novel cryptographic primitives that are impossible to achieve classically. A recent work by Ananth, Poremba, Vaikuntanathan (TCC 2023) focuses on equipping the dual-Regev encryption scheme, introduced by Gentry, Peikert, Vaikuntanathan (STOC 2008), with key revocation capabilities using quantum information. They further showed that the key-revocable dual-Regev scheme implies the existence of fully homomorphic encryption and pseudorandom functions, with both of them also equipped with key revocation capabilities. Unfortunately, they were only able to prove the security of their schemes based on new conjectures and left open the problem of basing the security of key revocable dual-Regev encryption on well-studied assumptions. In this work, we resolve this open problem. Assuming polynomial hardness of learning with errors (over sub-exponential modulus), we show that key-revocable dual-Regev encryption is secure. As a consequence, for the first time, we achieve the following results: Key-revocable public-key encryption and key-revocable fully-homomorphic encryption satisfying classical revocation security and based on polynomial hardness of learning with errors. Prior works either did not achieve classical revocation or were based on sub-exponential hardness of learning with errors. Key-revocable pseudorandom functions satisfying classical revocation from the polynomial hardness of learning with errors. Prior works relied upon unproven conjectures. 
    more » « less
  2. As the use of autonomous vehicles increase, the transportation infrastructure as a whole becomes more susceptible to cyber-attacks due to the increase of components that can communicate with one another and the Internet. It has been shown that autonomous vehicles benefit greatly from cooperating to perform many cost and life-saving applications such as tailgating, advanced collision warning, and even traffic routing. To secure the transportation infrastructure against this increasing risk, this paper presents an efficient blockchain scheme for vehicular ad-hoc networks of autonomous vehicles. In the proposed scheme, every vehicle maintains blocks generated by its platoon which contain transactions that evaluate the actions of every vehicle. Thus, vehicles will possess different blocks and thus different blockchains as they join and leave platoons. No central blockchain is maintained. These blocks are used as a token by the vehicle to gain access to future platoons. The proposed scheme uses the Schnorr digital signature scheme to create a secure signature and reach consensus within the platoon. It is proven to be secure under the given assumptions. 
    more » « less
  3. The global financial landscape is experiencing significant transformation driven by technological advancements and evolving market dynamics. Moreover, blockchain technology has become a pivotal platform with widespread applications, especially in finance. Cross-border payments have emerged as a key area of interest, with blockchain offering inherent benefits such as enhanced security, transparency, and efficiency compared to traditional banking systems. This paper presents a novel framework leveraging blockchain technology and smart contracts to emulate cross-border payments, ensuring interoperability and compliance with international standards such as ISO20022. Key contributions of this paper include a novel prototype framework for implementing smart contracts and web clients for streamlined transactions and a mechanism to translate ISO20022 standard messages. Our framework can provide a practical solution for secure, efficient, and transparent cross-border transactions, contributing to the ongoing evolution of global finance and the emerging landscape of decentralized finance. 
    more » « less
  4. X.509 certificates underpin the security of the Internet economy, notably secure web servers, and they need to be revoked promptly and reliably once they are compromised. The original revocation method specified in the X.509 standard, to distribute certificate revocation lists (CRLs), is both old and untrustworthy. CRLs are susceptible to attacks such as Man-in-the-Middle and Denial of Service. The newer Online Certificate Status Protocol (OCSP) and OCSP-stapling approaches have well-known drawbacks as well. The primary contribution of this paper is Secure Revocation as a Peer Service (SCRaaPS). SCRaaPS is an alternative, reliable way to support X.509 certificate revocation via the Scrybe secure provenance system. The blockchain support of Scrybe enables the creation of a durable, reliable revocation service that can withstand Denial-of-Service attacks and ensures non-repudiation of certificates revoked. We provide cross-CA-revocation information and address the additional problem of intermediate-certificate revocation with the knock-on effects on certificates derived thereof. A Cuckoo filter provides quick, communication-free testing by servers and browsers against our current revocation list (with no false negatives). A further contribution of this work is that the revocation service can fit in as a drop-in replacement for OCSP-stapling with superior performance and coverage both for servers and browsers. Potential revocation indicated by our Cuckoo filter is backed up by rigorous service query to eliminate false positives. Cuckoo filter parameters are also stored in our blockchain to provide open access to this algorithmic option for detection. We describe the advantages of using a blockchain-based system and, in particular, the approach to distributed ledger technology and lightweight mining enabled by Scrybe, which was designed with secure provenance in mind. 
    more » « less
  5. <italic>Abstract</italic> Cryptocurrencies and the underpinning blockchain technology have gained unprecedented public attention recently. In contrast to fiat currencies, transactions of cryptocurrencies, such as Bitcoin and Litecoin, are permanently recorded on distributed ledgers to be seen by the public. As a result, public availability of all cryptocurrency transactions allows us to create a complex network of financial interactions that can be used to study not only the blockchain graph, but also the relationship between various blockchain network features and cryptocurrency risk investment. We introduce a novel concept of chainlets, or blockchain motifs, to utilize this information. Chainlets allow us to evaluate the role of local topological structure of the blockchain on the joint Bitcoin and Litecoin price formation and dynamics. We investigate the predictive Granger causality of chainlets and identify certain types of chainlets that exhibit the highest predictive influence on cryptocurrency price and investment risk. More generally, while statistical aspects of blockchain data analytics remain virtually unexplored, the paper aims to highlight various emerging theoretical, methodological and applied research challenges of blockchain data analysis that will be of interest to the broad statistical community.The Canadian Journal of Statistics48: 561–581; 2020 © 2020 Statistical Society of Canada 
    more » « less