Implementação de um modelo computacional de troca justa utilizando ambiente de execução confiável
DOI:
https://doi.org/10.5540/03.2026.012.01.0295Keywords:
Troca justa, Ambientes de execução confiáveis, Sistemas distribuídosAbstract
Este artigo propõe um protocolo de troca justa com TTP descentralizado, que pode fazer uso de TEEs como Intel SGX, TrustZone ARM e AMD Secure Memory Encryption, para garantir a integridade das transações. A solução oferece maior privacidade e autonomia aos participantes, com a divisão do protocolo em attestables e PBB, permitindo uma implementação flexível e distribuída. Em síntese, este artigo apresenta uma abordagem que introduz um protocolo de troca justa com TTP descentralizado utilizando TEEs, visando garantir a privacidade e a autonomia dos participantes de uma troca.
Downloads
References
A. Abadi, S. Murdoch e T. Zacharias. “Recurring contingent service payment”. Em: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). IEEE. 2023, pp. 724–756. doi: https://Doi.org/10.1109/EuroSP57164.2023.00049.
Tiago Alves. “Trustzone: Integrated hardware and software security”. Em: Information Quarterly 3 (2004), pp. 18–24. doi: https://cir.nii.ac.jp/crid/1572824500864199424.
Nadarajah Asokan, Matthias Schunter e Michael Waidner. “Optimistic protocols for fair exchange”. Em: Proceedings of the 4th ACM Conference on Computer and Communications Security. 1997, pp. 7–17. doi: https://dl.acm.org/Doi/pdf/10.1145/266420.266426.
Nadarajah Asokan, Victor Shoup e Michael Waidner. “Asynchronous protocols for optimistic fair exchange”. Em: Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186). 1998, pp. 86–99. doi: https://ieeexplore.ieee.org/document/674826.
G. Avoine e S. Vaudenay. “Fair exchange with guardian angels”. Em: Information Security Applications: 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers 4. Springer. 2004, pp. 188–202. doi: https://Doi.org/10.1007/978-3-540-24591-9_15.
V. Costan e S. Devadas. Intel SGX Explained. Cryptology ePrint Archive, Paper 2016/086. 2016. doi: https://eprint.iacr.org/2016/086.
O. Ersoy, Z. Genç, Z. Erkin e M. Conti. “Practical exchange for unique digital goods”. Em:2021 IEEE International Conference on Decentralized Applications and Infrastructures(DAPPS). IEEE. 2021, pp. 49–58.doi:https://Doi.org/10.1109/DAPPS52256.2021.00011.
Shimon Even, Oded Goldreich e Abraham Lempel. “A randomized protocol for signing contracts”.Em:Communications of the ACM28.6 (1985). Ed. por USA ACM New York NY, pp. 637–647.doi:https://Doi.org/10.1145/3812.3818.
M. Franklin e M. Reiter. “Fair exchange with a semi-trusted third party”. Em:Proceedings ofthe 4th ACM Conference on Computer and Communications Security. 1997, pp. 1–5.doi:https://Doi.org/10.1145/266420.266424.
R. Grisenthwaite, G. Barnes, R. Watson, S. Moore, P. Sewell e J. Woodruff. “The Arm Morello Eva-luation Platform—Validating CHERI-Based Security in a High-Performance System”. Em:IEEEMicro43.3 (2023), pp. 50–57.doi:http://Doi.org/10.1109/MM.2023.3264676.
J. Jang, S. Kong, M. Kim, D. Kim e B. Kang. “Secret: Secure channel between rich executionenvironment and trusted execution environment.” Em:NDSS. 2015, pp. 1–15.doi:https://Doi.org/10.14722/ndss.2015.23189.
David Kaplan, Jeremy Powell e Tom Woller. “AMD memory encryption”. Em:White paper13(2016), p. 12.doi:http://docs.amd.com/v/u/en-US/memory-encryption-white-paper.
K. Küçük, A. Paverd, A. Martinw, N. Asokan, A. Simpson e R. Ankele. “Exploring the use of IntelSGX for secure many-party applications”. Em:Proceedings of the 1st Workshop on SystemSoftware for Trusted Execution. 2016, pp. 1–6.doi:https://Doi.org/10.1145/3007788.3007793.
T Moh. “A public key system with signature and master key functions”. Em:Communicationsin Algebra27.5 (1999), pp. 2207–2222.doi:https://Doi.org/10.1080/00927879908826559.
H. Pagnia, H. Vogt, F. Gärtner e U. Wilhelm. “Solving fair exchange with mobile agents”. Em:International Symposium on Agent Systems and Applications. Springer. 2000, pp. 57–72.doi:https://Doi.org/10.1007/978-3-540-45347-5_6.
I. Ray e I. Ray. “An optimistic fair exchange e-commerce protocol with automated dispute resolu-tion”. Em:Electronic Commerce and Web Technologies: First International Conference,EC-Web 2000 London, UK, September 4–6, 2000 Proceedings. Springer. 2001, pp. 84–93.doi:https://Doi.org/10.1007/3-540-44463-7_8.
M. Sabt, M. Achemlal e A. Bouabdallah. “Trusted execution environment: what it is, and whatit is not”. Em:2015 IEEE Trustcom/BigDataSE/Ispa. Vol. 1. IEEE. 2015, pp. 57–64.doi:http://Doi.org/10.1109/Trustcom.2015.357.
Liang Zhang, Haibin Kan, Feiyang Qiu e Feng Hao. “A publicly verifiable optimistic fair exchangeprotocol using decentralized CP-ABE”. Em:The Computer Journal67.3 (2024), pp. 1017–1029.doi:https://Doi.org/10.1093/comjnl/bxad039