MoneroResearch.info |
Resource type: Proceedings Article BibTeX citation key: Guo2024 View all bibliographic details |
Categories: Monero-focused Creators: Guo Publisher: Springer Collection: International Conference on Data Security and Privacy Protection |
Views: 26/26
|
Attachments Secure_monero_firewall.cleaned.pdf [5/5] | URLs https://link.sprin ... 78-981-97-8540-7_4 |
Abstract |
Monero is known as a cryptocurrency for its ability to provide greater anonymity. At its core is the RingCT protocol that can hide the sender and the amount of money in a transaction. However, the Snowden revelation alerts us that the implementation of cryptographic algorithms in practice might be substituted covertly which would result in a complete breach of the security of the cryptosystem. In this work, we turn to evaluate the potential hazards of algorithm substitution attacks (ASAs) against the RingCT protocol and explore feasible countermeasures. In specific, we first present the ASA model for RingCT where the goals of adversary include diminishing sender anonymity and recovering the spending key, then propose concrete ASAs against RingCT protocols that are undetectable in terms of the output of algorithms. Finally, we show how to thwart ASAs on RingCT protocols with reverse firewalls.
|