Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3319535.3363221acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware

Published: 06 November 2019 Publication History

Abstract

We propose Tesseract, a secure real-time cryptocurrency exchange service. Existing centralized exchange designs are vulnerable to theft of funds, while decentralized exchanges cannot offer real-time cross-chain trades. All currently deployed exchanges are also vulnerable to frontrunning attacks. Tesseract overcomes these flaws and achieves a best-of-both-worlds design by using a trusted execution environment. The task of committing the recent trade data to independent cryptocurrency systems presents an all-or-nothing fairness problem, to which we present ideal theoretical solutions, as well as practical solutions. Tesseract supports not only real-time cross-chain cryptocurrency trades, but also secure tokenization of assets pegged to cryptocurrencies. For instance, Tesseract-tokenized bitcoins can circulate on the Ethereum blockchain for use in smart contracts. We provide a demo implementation of Tesseract that supports Bitcoin, Ethereum, and similar cryptocurrencies.

Supplementary Material

WEBM File (p1521-ji.webm)

References

[1]
Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, and Leonid Reyzin. 2017. Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space. In 23rd ASIACRYPT.
[2]
Alexey Akhunov. [n.d.]. https://github.com/ledgerwatch/eth_state/.
[3]
Ittai Anati, Shay Gueron, Simon Johnson, and Vincent Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. In HASP'13. 1--7. https://doi.org/10.1.1.405.8266
[4]
Gavin Andresen. [n.d.]. P2SH. https://github.com/bitcoin/bips/blob/master/bip-0016.mediawiki.
[5]
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek. 2014a. Fair Two-Party Computations via Bitcoin Deposits. In FC.
[6]
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek. 2014b. Secure Multiparty Computations on Bitcoin. In IEEE S&P.
[7]
Sarah Azouvi, Patrick McCorry, and Sarah Meiklejohn. [n.d.]. Betting on Blockchain Consensus with Fantomette. https://arxiv.org/abs/1805.06786.
[8]
Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On Bitcoin and red balloons. In ACM Conference on Electronic Commerce. 56--73.
[9]
Adam Back. 2013. $O(2^80)$ theoretical attack on P2SH. https://bitcointalk.org/index.php?topic=323443.0.
[10]
Clare Baldwin. [n.d.]. http://www.reuters.com/article/us-bitfinex-hacked-hongkong-idUSKCN10E0KP.
[11]
Andrew Barisser. 2015. https://medium.com/on-banking/high-frequency-trading-on-the-coinbase-exchange-f804c80f507b.
[12]
Massimo Bartoletti and Livio Pompianu. 2017. An analysis of Bitcoin OP_RETURN metadata. In FC. https://arxiv.org/abs/1702.01024.
[13]
Jethro Beekman. 2014. A Denial of Service Attack against Fair Computations using Bitcoin Deposits. https://eprint.iacr.org/2014/911.
[14]
Juan Benet. [n.d.]. https://ipfs.io/.
[15]
Iddo Bentov, Ariel Gabizon, and Alex Mizrahi. 2016. Cryptocurrencies without Proof of Work. In Financial Cryptography Bitcoin Workshop.
[16]
Iddo Bentov, Yan Ji, Fan Zhang, Lorenz Breidenbach, Philip Daian, and Ari Juels. 2017a. Full Technical Report, Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware. https://eprint.iacr.org/2017/1153.
[17]
Iddo Bentov, Ranjit Kumaresan, and Andrew Miller. [n.d.] a. Instantaneous Decentralized Poker. In Asiacrypt 2017.
[18]
Iddo Bentov, Charles Lee, Alex Mizrahi, and Meni Rosenfeld. [n.d.] b. Proof of activity: extending Bitcoin's proof of work via proof of stake. In NetEcon 2014.
[19]
Iddo Bentov, Alex Mizrahi, and Meni Rosenfeld. 2017b. Decentralized Prediction Market without Arbiters. In Financial Cryptography 4th Bitcoin Workshop.
[20]
Iddo Bentov, TierNolan, et al. 2013. Atomic transfers. https://bitcointalk.org/index.php?topic=193281.msg2224949#msg2224949.
[21]
Daniel J. Bernstein, Tanja Lange, and Peter Schwabe. [n.d.]. The Security Impact of a New Cryptographic Library. In LATINCRYPT 2012.
[22]
Bitcoin developers. 2019. Segregated Witness. https://en.bitcoin.it/wiki/Segregated_Witness.
[23]
Daniel G Brown. 2011. How I wasted too long finding a concentration inequality for sums of geometric variables. https://cs. uwaterloo. ca/browndg/negbin. pdf.
[24]
Benedikt Bünz, Lucianna Kiffer, Loi Luu, and Mahdi Zamani. [n.d.]. Flyclient: Super-Light Clients for Cryptocurrencies. https://eprint.iacr.org/2019/226.
[25]
CryptoAsset Market Capitalizations. [n.d.]. https://coinmarketcap.com/assets/.
[26]
Clark, Bonneau, Felten, Kroll, Andrew Miller, and Narayanan. 2014. On Decentralizing Prediction Markets and Order Books. In WEIS.
[27]
K. Croman, C. Decker, I. Eyal, A. Gencer, A. Juels, A. Kosba, A. Miller, P. Saxena, E. Shi, E. Sirer, D. Song, and R. Wattenhofer. 2016. On Scaling Decentralized Blockchains. In FC Bitcoin Workshop.
[28]
Leslie Culbertson. [n.d.]. https://newsroom.intel.com/editorials/protecting-our-customers-through-lifecycle-security-threats.
[29]
Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. [n.d.]. Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges.
[30]
Phil Daian, Rafael Pass, and Elaine Shi. 2019. Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proofs of Stake. FC.
[31]
Allen Day and Colin Bookman. 2018. Bitcoin in BigQuery: blockchain analytics on public data. https://cloud.google.com/blog/products/gcp/bitcoin-in-bigquery-blockchain-analytics-on-public-data.
[32]
Christian Decker and Roger Wattenhofer. 2015. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels. In 17th SSS.
[33]
Desmedt and Frankel. 1989. Threshold Cryptosystems. In CRYPTO.
[34]
Roger Dingledine, Nick Mathewson, and Paul F. Syverson. 2004. Tor: The Second-Generation Onion Router. In 13th Usenix Security.
[35]
dree12 (pseudonym). [n.d.]. List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses. https://bitcointalk.org/index.php?topic=576337.
[36]
Devdatt P. Dubhashi and Alessandro Panconesi. 2009. Concentration of Measure for the Analysis of Randomized Algorithms. Cambridge Uni. Press.
[37]
Tuyet Duong, Lei Fan, Thomas Veale, and Hong-Sheng Zhou. [n.d.]. Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power., Vol. 2016 ( [n.,d.]). http://eprint.iacr.org/2016/716
[38]
Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak. 2015. Proofs of Space. In CRYPTO.
[39]
Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, and Sergey Gorbunov. 2017. Iron: Functional Encryption using Intel SGX.
[40]
Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In Eurocrypt.
[41]
Rosario Gennaro, Steven Goldfeder, and Arvind Narayanan. 2016. Threshold-Optimal DSA/ECDSA Signatures. In 14th ACNS.
[42]
Arthur Gervais and Rami Khalil. 2018. The Liquidity Network. https://liquidity.network/whitepaper_Liquidity_Network.pdf.
[43]
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. In 26th Symposium on Operating Systems Principles.
[44]
Sharon Goldberg, Ethan Heilman, and other. 2018. Arwen. https://www.arwen.io/.
[45]
BitFury Group. 2015. http://bitfury.com/content/5-white-papers-research/pos-vs-pow-1.0.2.pdf.
[46]
Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, and Sharon Goldberg. 2017. TumbleBit. In NDSS. https://eprint.iacr.org/2016/575.
[47]
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th Usenix Security.
[48]
Maurice Herlihy. 2018. Atomic Cross-Chain Swaps. In PODC.
[49]
Matthew Hoekstra, Reshma Lal, Pradeep Pappachan, Vinay Phegade, and Juan Del Cuvillo. 2013. Hasp, http://dl.acm.org/citation.cfm?doid=2487726.2488370.
[50]
SP Johnson, VR Scarlata, C Rozas, E Brickell, and F Mckeen. 2016. https://software.intel.com/en-us/blogs/2016/03/09/intel-sgx-epid-provisioning-and-attestation-services.
[51]
Keystone. [n.d.]. https://keystone-enclave.org/.
[52]
Rami Khalil, Arthur Gervais, and Guillaume Felley. [n.d.]. TEX - A Securely Scalable Trustless Exchange. https://eprint.iacr.org/2019/265.
[53]
Aggelos Kiayias, Ioannis Konstantinou, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017a. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In CRYPTO.
[54]
Aggelos Kiayias, Andrew Miller, and Dionysis Zindros. 2017b. Non-interactive proofs of proof-of-work. https://eprint.iacr.org/2017/963.
[55]
Aggelos Kiayias, Hong-Sheng Zhou, and Vassilis Zikas. 2015. Fair and Robust Multi-Party Computation using a Global Transaction Ledger. In Eurocrypt.
[56]
Sophie Knight. [n.d.]. http://www.reuters.com/article/us-bitcoin-mtgox-wallet-idUSBREA2K05N20140321.
[57]
Johnson Lau. [n.d.]. https://github.com/jl2012/bips/blob/vault/bip-0VVV.mediawiki.
[58]
Joshua Lind, Ittay Eyal, Florian Kelbert, Oded Naor, Peter R. Pietzuch, and Emin Gü n Sirer. 2018. Teechain. In 11th SYSTOR.
[59]
Loi Luu and Yaron Velner. 2017. KyberNetwork White Paper. https://kyber.network/assets/KyberNetworkWhitepaper.pdf.
[60]
mappum (pseudonym). 2015. Mercury -- Fully trustless cryptocurrency exchange. https://bitcointalk.org/index.php?topic=946174.0.
[61]
Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE. http://eprint.iacr.org/2017/048.
[62]
McCorry, Heilman, and Miller. [n.d.]. Atomically Trading with Roger: Gambling on the success of a hardfork. http://eprint.iacr.org/2017/694.
[63]
Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, and Feng Hao. 2016. Towards Bitcoin Payment Networks. In ACISP.
[64]
McKeen, Alexandrovich, Berenzon, Rozas, Shafi, Shanbhogue, and Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In HASP.
[65]
Robert McMillan. 2013. $1.2M Hack Shows Why You Should Never Store Bitcoins on the Internet. https://www.wired.com/2013/11/inputs/.
[66]
Danielle Meegan. [n.d.]. https://www.ethnews.com/relay-attack-leads-to-etc-loss-on-ethereum-exchange.
[67]
Andrew Miller. 2016. Provable Security for Cryptocurrencies. Ph.D. Dissertation. University of Maryland, College Park.
[68]
Tal Moran and Ilan Orlov. 2019. Rational Proofs of Space-Time. Crypto (2019).
[69]
Sebastian Muller, Franziska Brecht, Benjamin Fabian, Steffen Kunz, and Dominik Kunze. 2012. Distributed performance measurement and usability assessment of the tor anonymization network. In Future Internet, Vol. 4(2). 488--513.
[70]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[71]
Satoshi Nakamoto. 2010. https://bitcointalk.org/index.php?topic=1786.msg22119#msg22119.
[72]
Chia Network. 2018. https://chia.network/.
[73]
NIST. 2018. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800--90B.pdf.
[74]
Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, and Peter Gazi. 2015. Spacemint: A Cryptocurrency Based on Proofs of Space. IACR Cryptology ePrint Archive, Vol. 2015 (2015), 528. http://eprint.iacr.org/2015/528
[75]
Rafael Pass, Lior Seeman, and abhi shelat. 2017a. Analysis of the Blockchain Protocol in Asynchronous Networks. In Eurocrypt.
[76]
Rafael Pass, Elaine Shi, and Florian Tramer. 2017b. Formal Abstractions for Attested Execution Secure Processors. In Eurocrypt.
[77]
Andrew Poelstra, Adam Back, Mark Friedenbach, Gregory Maxwell, and Pieter Wuille. 2017. Confidential Assets. In FC Bitcoin Workshop.
[78]
Poon and Dryja. [n.d.]. https://lightning.network/lightning-network-paper.pdf.
[79]
Portela, Barbosa, Scerri, Warinschi, Bahmani, Brasser, and Sadeghi. 2017. Secure Multiparty Computation from SGX. In FC.
[80]
Portnoy and Eckersley. [n.d.]. https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it.
[81]
profitgenerator. 2017. EtherDelta. https://steemit.com/ethereum/@profitgenerator/etherdelta-decentralized-token-exchange.
[82]
Meni Rosenfeld. 2012. Colored Coins. https://bitcoil.co.il/files/Colored%20Coins.pdf and https://bitcoil.co.il/BitcoinX.pdf.
[83]
Meni Rosenfeld. 2014. http://arxiv.org/abs/1402.2009.
[84]
Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2017. P2P Mixing and Unlinkable Bitcoin Transactions. In NDSS 2017.
[85]
Fabian Schuh and Daniel Larimer. [n.d.]. BitShares. https://bravenewcoin.com/assets/Whitepapers/bitshares-financial-platform.pdf.
[86]
Felix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, and Mark Russinovich. 2015. VC3. In IEEE S&P.
[87]
ShapeShift. [n.d.]. https://shapeshift.io/.
[88]
Spacemesh. [n.d.]. https://spacemesh.io/.
[89]
Tony Spilotro. 2018. Only 4 Crypto Exchanges Have 100,000
[90]
Active Users. https://www.newsbtc.com/2018/12/12/crypto-exchanges-active-users/.
[91]
Raoul Strackx and Frank Piessens. 2016. Ariadne: A Minimal Approach to State Continuity. In 25th USENIX Security.
[92]
Paul Sztorc. 2015. http://www.truthcoin.info/blog/bitusd/.
[93]
Todd. [n.d.]. https://github.com/bitcoin/bips/blob/master/bip-0065.mediawiki.
[94]
Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, and Elaine Shi. 2017. Sealed-Glass Proofs. In Euro S&P.
[95]
Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, and Prateek Saxena. 2018. Obscuro: A Secure and Anonymous Bitcoin Mixer using SGX. In ACSAC.
[96]
Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-order Execution. In USENIX.
[97]
Warren and Bandeali. [n.d.]. https://0xproject.com/pdfs/0x_white_paper.pdf.
[98]
Pieter Wuille et al. [n.d.] a. https://bitcoincore.org/en/2017/03/23/schnorr-signature-aggregation/.
[99]
Pieter Wuille, Gregory Maxwell, et al. [n.d.] b. https://github.com/bitcoin-core/secp256k1.
[100]
Xu, Cui, and Peinado. 2015. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In IEEE S&P.
[101]
Joseph Young. [n.d.]. https://www.newsbtc.com/2017/11/10/54991/.
[102]
Joseph Young. 2016. https://cointelegraph.com/news/china-imposes-new-capital-controls-bitcoin-price-optimistic.
[103]
Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, and William J. Knottenbelt. [n.d.]. XCLAIM: Trustless, Interoperable Cryptocurrency-Backed Assets. https://eprint.iacr.org/2018/643.
[104]
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town Crier: An Authenticated Data Feed for Smart Contracts. In CCS.
[105]
Fengwei Zhang and Hongwei Zhang. 2016. SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security (HASP).
[106]
ZIP143. [n.d.]. https://github.com/zcash/zips/blob/master/zip-0143.rst.

Cited By

View all
  • (2025)CrossChannel: Efficient and Scalable Cross-Chain Transactions Through Cross-and-Off-Blockchain Micropayment ChannelIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.341182022:1(649-663)Online publication date: Jan-2025
  • (2025)Research on Face Recognition System Based on RLWE Homomorphic EncryptionSecurity and Privacy in New Computing Environments10.1007/978-3-031-73699-5_5(67-84)Online publication date: 1-Jan-2025
  • (2024)A Framework for Full Decentralization in Blockchain InteroperabilitySensors10.3390/s2423763024:23(7630)Online publication date: 29-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
November 2019
2755 pages
ISBN:9781450367479
DOI:10.1145/3319535
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptocurrency exchanges
  2. frontrunning
  3. trusted hardware

Qualifiers

  • Research-article

Funding Sources

Conference

CCS '19
Sponsor:

Acceptance Rates

CCS '19 Paper Acceptance Rate 149 of 934 submissions, 16%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)542
  • Downloads (Last 6 weeks)75
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)CrossChannel: Efficient and Scalable Cross-Chain Transactions Through Cross-and-Off-Blockchain Micropayment ChannelIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.341182022:1(649-663)Online publication date: Jan-2025
  • (2025)Research on Face Recognition System Based on RLWE Homomorphic EncryptionSecurity and Privacy in New Computing Environments10.1007/978-3-031-73699-5_5(67-84)Online publication date: 1-Jan-2025
  • (2024)A Framework for Full Decentralization in Blockchain InteroperabilitySensors10.3390/s2423763024:23(7630)Online publication date: 29-Nov-2024
  • (2024)A Survey of Consortium Blockchain and Its ApplicationsCryptography10.3390/cryptography80200128:2(12)Online publication date: 22-Mar-2024
  • (2024)Atomic cross-chain swap based on private key exchangeCybersecurity10.1186/s42400-023-00202-87:1Online publication date: 2-Jun-2024
  • (2024)SoK: MEV CountermeasuresProceedings of the Workshop on Decentralized Finance and Security10.1145/3689931.3694911(21-30)Online publication date: 19-Nov-2024
  • (2024)Data Independent Order Policy Enforcement: Limitations and SolutionsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670367(378-392)Online publication date: 2-Dec-2024
  • (2024)Ratel: MPC-extensions for Smart ContractsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3661142(336-352)Online publication date: 1-Jul-2024
  • (2024)Unstoppable Wallets: Chain-assisted Threshold ECDSA and its ApplicationsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637657(1844-1860)Online publication date: 1-Jul-2024
  • (2024)A Monitoring-Free Bitcoin Payment Channel Scheme With Support for Real-Time SettlementIEEE Transactions on Services Computing10.1109/TSC.2024.339039617:5(1924-1937)Online publication date: Sep-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media