Implementação de um modelo computacional de troca justa utilizando ambiente de execução confiável

Autores

  • Dhileane A. Rodrigues Unijuí
  • Fabricia C. Roos-Frantz Unijuí
  • Rafael Z. Frantz Unijuí
  • Sandro Sawicki Unijuí
  • Carlos Molina-Jimenez Cambridge, Cambridge, UK

DOI:

https://doi.org/10.5540/03.2026.012.01.0295

Palavras-chave:

Troca justa, Ambientes de execução confiáveis, Sistemas distribuídos

Resumo

Este artigo propõe um protocolo de troca justa com TTP descentralizado, que pode fazer uso de TEEs como Intel SGX, TrustZone ARM e AMD Secure Memory Encryption, para garantir a integridade das transações. A solução oferece maior privacidade e autonomia aos participantes, com a divisão do protocolo em attestables e PBB, permitindo uma implementação flexível e distribuída. Em síntese, este artigo apresenta uma abordagem que introduz um protocolo de troca justa com TTP descentralizado utilizando TEEs, visando garantir a privacidade e a autonomia dos participantes de uma troca.

Downloads

Não há dados estatísticos.

Referências

A. Abadi, S. Murdoch e T. Zacharias. “Recurring contingent service payment”. Em: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). IEEE. 2023, pp. 724–756. doi: https://Doi.org/10.1109/EuroSP57164.2023.00049.

Tiago Alves. “Trustzone: Integrated hardware and software security”. Em: Information Quarterly 3 (2004), pp. 18–24. doi: https://cir.nii.ac.jp/crid/1572824500864199424.

Nadarajah Asokan, Matthias Schunter e Michael Waidner. “Optimistic protocols for fair exchange”. Em: Proceedings of the 4th ACM Conference on Computer and Communications Security. 1997, pp. 7–17. doi: https://dl.acm.org/Doi/pdf/10.1145/266420.266426.

Nadarajah Asokan, Victor Shoup e Michael Waidner. “Asynchronous protocols for optimistic fair exchange”. Em: Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186). 1998, pp. 86–99. doi: https://ieeexplore.ieee.org/document/674826.

G. Avoine e S. Vaudenay. “Fair exchange with guardian angels”. Em: Information Security Applications: 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers 4. Springer. 2004, pp. 188–202. doi: https://Doi.org/10.1007/978-3-540-24591-9_15.

V. Costan e S. Devadas. Intel SGX Explained. Cryptology ePrint Archive, Paper 2016/086. 2016. doi: https://eprint.iacr.org/2016/086.

O. Ersoy, Z. Genç, Z. Erkin e M. Conti. “Practical exchange for unique digital goods”. Em:2021 IEEE International Conference on Decentralized Applications and Infrastructures(DAPPS). IEEE. 2021, pp. 49–58.doi:https://Doi.org/10.1109/DAPPS52256.2021.00011.

Shimon Even, Oded Goldreich e Abraham Lempel. “A randomized protocol for signing contracts”.Em:Communications of the ACM28.6 (1985). Ed. por USA ACM New York NY, pp. 637–647.doi:https://Doi.org/10.1145/3812.3818.

M. Franklin e M. Reiter. “Fair exchange with a semi-trusted third party”. Em:Proceedings ofthe 4th ACM Conference on Computer and Communications Security. 1997, pp. 1–5.doi:https://Doi.org/10.1145/266420.266424.

R. Grisenthwaite, G. Barnes, R. Watson, S. Moore, P. Sewell e J. Woodruff. “The Arm Morello Eva-luation Platform—Validating CHERI-Based Security in a High-Performance System”. Em:IEEEMicro43.3 (2023), pp. 50–57.doi:http://Doi.org/10.1109/MM.2023.3264676.

J. Jang, S. Kong, M. Kim, D. Kim e B. Kang. “Secret: Secure channel between rich executionenvironment and trusted execution environment.” Em:NDSS. 2015, pp. 1–15.doi:https://Doi.org/10.14722/ndss.2015.23189.

David Kaplan, Jeremy Powell e Tom Woller. “AMD memory encryption”. Em:White paper13(2016), p. 12.doi:http://docs.amd.com/v/u/en-US/memory-encryption-white-paper.

K. Küçük, A. Paverd, A. Martinw, N. Asokan, A. Simpson e R. Ankele. “Exploring the use of IntelSGX for secure many-party applications”. Em:Proceedings of the 1st Workshop on SystemSoftware for Trusted Execution. 2016, pp. 1–6.doi:https://Doi.org/10.1145/3007788.3007793.

T Moh. “A public key system with signature and master key functions”. Em:Communicationsin Algebra27.5 (1999), pp. 2207–2222.doi:https://Doi.org/10.1080/00927879908826559.

H. Pagnia, H. Vogt, F. Gärtner e U. Wilhelm. “Solving fair exchange with mobile agents”. Em:International Symposium on Agent Systems and Applications. Springer. 2000, pp. 57–72.doi:https://Doi.org/10.1007/978-3-540-45347-5_6.

I. Ray e I. Ray. “An optimistic fair exchange e-commerce protocol with automated dispute resolu-tion”. Em:Electronic Commerce and Web Technologies: First International Conference,EC-Web 2000 London, UK, September 4–6, 2000 Proceedings. Springer. 2001, pp. 84–93.doi:https://Doi.org/10.1007/3-540-44463-7_8.

M. Sabt, M. Achemlal e A. Bouabdallah. “Trusted execution environment: what it is, and whatit is not”. Em:2015 IEEE Trustcom/BigDataSE/Ispa. Vol. 1. IEEE. 2015, pp. 57–64.doi:http://Doi.org/10.1109/Trustcom.2015.357.

Liang Zhang, Haibin Kan, Feiyang Qiu e Feng Hao. “A publicly verifiable optimistic fair exchangeprotocol using decentralized CP-ABE”. Em:The Computer Journal67.3 (2024), pp. 1017–1029.doi:https://Doi.org/10.1093/comjnl/bxad039

Downloads

Publicado

2026-02-13

Edição

Seção

Trabalhos Completos