ShadowEth: Private Smart Contract on Public Blockchain

Blockchain is becoming popular as a distributed and reliable ledger which allows distrustful parties to transact safely without trusting third parties. Emerging blockchain systems like Ethereum support smart contracts where miners can run arbitrary user-defined programs. However, one of the biggest...

Full description

Saved in:
Bibliographic Details
Published inJournal of computer science and technology Vol. 33; no. 3; pp. 542 - 556
Main Authors Yuan, Rui, Xia, Yu-Bin, Chen, Hai-Bo, Zang, Bin-Yu, Xie, Jan
Format Journal Article
LanguageEnglish
Published New York Springer US 01.05.2018
Springer
Springer Nature B.V
Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University, Shanghai 200240, China%Cryptape Inc., Hangzhou 310007, China
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Blockchain is becoming popular as a distributed and reliable ledger which allows distrustful parties to transact safely without trusting third parties. Emerging blockchain systems like Ethereum support smart contracts where miners can run arbitrary user-defined programs. However, one of the biggest concerns about the blockchain and the smart contract is privacy, since all the transactions on the chain are exposed to the public. In this paper, we present ShadowEth, a system that leverages hardware enclave to ensure the confidentiality of smart contracts while keeping the integrity and availability based on existing public blockchains like Ethereum. ShadowEth establishes a confidential and secure platform protected by trusted execution environment (TEE) off the public blockchain for the execution and storage of private contracts. It only puts the process of verification on the blockchain. We provide a design of our system including a protocol of the cryptographic communication and verification and show the applicability and feasibility of ShadowEth by various case studies. We implement a prototype using the Intel SGX on the Ethereum network and analyze the security and availability of the system.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1000-9000
1860-4749
DOI:10.1007/s11390-018-1839-y