Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin

@inproceedings{Goldfeder2017EscrowPF,
  title={Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin},
  author={Steven Goldfeder and Joseph Bonneau and Rosario Gennaro and Arvind Narayanan},
  booktitle={Financial Cryptography},
  year={2017}
}
We consider the problem of buying physical goods with cryptocurrencies. [] Key Method We formalize the escrow problem and present a suite of schemes with improved security and privacy properties. Our schemes are compatible with Bitcoin and similar blockchain-based cryptocurrencies.

Cheat Proof Escrow System for Blockchain

  • Anjaneyulu EndurthiA. Khare
  • Computer Science
    2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS)
  • 2021
An algorithm is proposed which provides security and privacy and also guarantees unbiased service to buyer as well as seller along with a cheat proof escrow.

Practical Escrow Protocol for Bitcoin

This work evaluates the existing escrow protocols for cryptocurrency and proposes a practical escrow protocol for Bitcoin that is: (a) computationally efficient; (b) round efficient; and (c) privacy-preserving.

A Privacy-Preserving E-Commerce System Based on the Blockchain Technology

A privacy-preserving business protocol by employing private smart contracts in the negotiation phase that allows counterparties make deals without the disclosure of private information such as identities, addresses, and phone numbers is designed.

Privacy-Preserving Protocol for Atomic Swap Between Blockchains

This thesis proposes a generic framework for atomic swap, called PolySwap, that enables fair exchange of assets between two heterogeneous sets of blockchains and introduces a novel secret sharing signature (SSSig) scheme to remove the necessity of common interfaces between blockchains in question.

JugglingSwap: Scriptless Atomic Cross-Chain Swaps

The assumptions about blockchains that can be included in the ACCS protocol are weakened, and only require that a threshold variant exists to the underlying digital signature scheme and it is based on the elliptic curve discrete logarithm problem (ECDLP).

Off-chain protocols for cryptocurrencies

This work shows how to construct threshold signatures that are compatible with Bitcoin, and uses this primitive to build off-chain protocols for privacy-preserving access control and escrow services, and presents Arbitrum, a private and scalable smart contract system which enables running arbitrary smart contracts for which the code is executed off- chain and disputes are resolved on-chain.

Solving the Buyer and Seller’s Dilemma: A Dual-Deposit Escrow Smart Contract for Provably Cheat-Proof Delivery and Payment for a Digital Good without a Trusted Mediator

This work presents a dual-deposit escrow trade protocol which uses double-sided payment deposits in conjunction with simple cryptographic primitives, and that can be implemented using a blockchain-based smart contract.

Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin

A decentralized protocol for star topology based on the bitcoin that can guarantee fairness, resist double spending and sybil attack, and can be extended to apply to any topology.

An Incentive-Compatible Smart Contract for Decentralized Commerce

  • N. I. Schwartzbach
  • Mathematics, Computer Science
    2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
  • 2021
A smart contract is proposed that allows two mutually distrusting parties to transact any non-digital goods or services on a blockchain and is proved that the contract is secure in a strong game-theoretic sense if and only if the arbiter is biased in favor of honest parties.

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware

Tesseract achieves a best-of-both-worlds design by using a trusted execution environment and supports not only real-time cross-chain cryptocurrency trades, but also secure tokenization of assets pegged to cryptocurrencies.
...

References

SHOWING 1-10 OF 35 REFERENCES

Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts

Although smart contracts are believed to have a huge potential, for the moment they are not widely used in practice, because most of Bitcoin miners allow only to post standard transactions on the blockchain, it is currently very hard to create non-trivial smart contracts in Bitcoin.

Fair Two-Party Computations via Bitcoin Deposits

The Bitcoin currency system can be used to obtain fairness in any two-party secure computation protocol in the following sense: if one party aborts the protocol after learning the output then the other party gets a financial compensation (in bitcoins).

Centrally Banked Cryptocurrencies

RSCoin is introduced, a cryptocurrency framework in which central banks maintain complete control over the monetary supply, but rely on a distributed set of authorities, or mintettes, to prevent double-spending.

Practical Verifiable Encryption and Decryption of Discrete Logarithms

This paper presents a variant of the new public key encryption of Cramer and Shoup based on Paillier's decision composite residuosity assumption, along with efficient protocols for verifiable encryption and decryption of discrete logarithms.

How to Use Bitcoin to Design Fair Protocols

It is shown how the Bitcoin network can be used to achieve the above notion of fairness in the two-party as well as the multiparty setting (with a dishonest majority) in this model of fairness.

Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security

This paper presents the first general threshold DSA scheme that does not require an honest majority and is useful for securing Bitcoin wallets, and presents a compelling application to use the scheme: securingBitcoin wallets.

Secure Multiparty Computations on Bitcoin

The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions.

Two-party generation of DSA signatures

We describe a means of sharing the DSA signature function, so that two parties can efficiently generate a DSA signature with respect to a given public key but neither can alone. We focus on a certain

Bitcoin: A Peer-to-Peer Electronic Cash System

This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.

Efficient and practical fair exchange protocols with off-line TTP

  • F. BaoR. DengW. Mao
  • Computer Science, Mathematics
    Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)
  • 1998
The protocols presented here are the first exchange protocols which use offline TTP and at the same time guarantee true fair exchange of digital messages and introduce a novel cryptographic primitive, called the Certificate of Encrypted Message Being a Signature (CEMBS), as the basic building block of the fair exchange protocols.