MoneroResearch.info

WIKINDX Resources

Guo, S. 2024, Secure Monero on Corrupted Machines with Reverse Firewalls. Paper presented at International Conference on Data Security and Privacy Protection. 
Added by: Jack (17/01/2025, 17:30)   Last edited by: Jack (17/01/2025, 17:31)
Resource type: Proceedings Article
BibTeX citation key: Guo2024
View all bibliographic details
Categories: Monero-focused
Creators: Guo
Publisher: Springer
Collection: International Conference on Data Security and Privacy Protection
Views: 26/26
Attachments   Secure_monero_firewall.cleaned.pdf [5/5] URLs   https://link.sprin ... 78-981-97-8540-7_4
Abstract
Monero is known as a cryptocurrency for its ability to provide greater anonymity. At its core is the RingCT protocol that can hide the sender and the amount of money in a transaction. However, the Snowden revelation alerts us that the implementation of cryptographic algorithms in practice might be substituted covertly which would result in a complete breach of the security of the cryptosystem. In this work, we turn to evaluate the potential hazards of algorithm substitution attacks (ASAs) against the RingCT protocol and explore feasible countermeasures. In specific, we first present the ASA model for RingCT where the goals of adversary include diminishing sender anonymity and recovering the spending key, then propose concrete ASAs against RingCT protocols that are undetectable in terms of the output of algorithms. Finally, we show how to thwart ASAs on RingCT protocols with reverse firewalls.
  
WIKINDX 6.10.2 | Total resources: 238 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced