MRCC: A Practical Covert Channel Over Monero With Provable Security

نویسندگان

چکیده

Covert channels are designed to protect the communication relationship of sender and receiver. Traditional covert have become insecure due continuous improvement traffic analysis techniques. In this context, there is an urgent need identify new approaches for channels. Blockchain emerging technique with characteristics user anonymity, a flooding propagation mechanism, tamper resistance, which make it compelling platform Previous applied Bitcoin as underlying blockchain, its pseudoanonymity may expose relationship. Moreover, reliance these on prenegotiated labels transactions containing messages further reduced their concealment. work, we present practical secure channel over Monero. Compared Bitcoin, Monero's full anonymity efficiently protects between no employed special transactions. The receiver filters extracts message using his private key. study, complete assessment robustness, reliability, anti-traceability our protocol, properties regarded desirable channel. We also formalize definition security through transaction distinguishing experiment. A rigorous proof shows that protocol meets use. Finally, detailed comparison existing blockchain-based

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QUAD: A Practical Stream Cipher with Provable Security

We introduce a practical synchronous stream cipher with provable security named QUAD. The cipher relies on the iteration of a multivariate quadratic system of m equations in n < m unknowns over a finite field. The security of QUAD is provably reducible to the conjectured intractability of the MQ problem, namely solving a multivariate system of quadratic equations.

متن کامل

A New Covert Channel over Cellular Voice Channel in Smartphones

smartphones has become increasingly important as smartphones have recently replaced the role of traditional computers. Smartphones are subject to traditional computer network covert channel techniques. Smartphones also introduce new sets of covert channel techniques as they add more capabilities and multiple network connections. This work presents a new network covert channel in smartphones. Th...

متن کامل

Covert channel for improving VoIP security

In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...

متن کامل

Covert Communication over a K-User Multiple Access Channel

We consider a scenario in which K transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless multiple-access channel (MAC) while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself ...

متن کامل

A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries

Oblivious transfer plays a fundamental role in the area of secure distributed computation. In particular, this primitive is used to search items in decentralized databases. Using a variant of smooth projective hash previously presented by Zeng et al., we construct a practical framework for t-out-of-n oblivious transfer in the plain model without any set-up assumption. It can be implemented unde...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3060285