The Ring of Gyges: Using Smart Contracts for Crime

نویسندگان

  • Ari Juels
  • Ahmed Kosba
  • Elaine Shi
چکیده

Thanks to their anonymity (pseudonymity) and lack of trusted intermediaries, cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and communities. Unfortunately, some are criminal, e.g., money laundering, marketplaces for illicit goods, and ransomware. Next-generation cryptocurrencies such as Ethereum will include rich scripting languages in support of smart contracts, programs that autonomously intermediate transactions. We illuminate the extent to which these new cryptocurrencies, by enabling criminal activities to be conducted anonymously and with minimal trust assumptions, may fuel new criminal ecosystems. Specifically, we show how what we call criminal smart contracts (CSCs) can facilitate leakage of confidential information, theft of cryptographic keys, and various realworld crimes (murder, arson, terrorism). We show significantly that CSCs for leakage of secrets are efficiently realizable in existing scripting languages such as that in Ethereum. We show that CSCs for key theft can be achieved using cryptographic primitives, such as Succinct Non-interactive ARguments of Knowledge (SNARKs), that are already expressible in these languages and for which efficient supporting language extensions are anticipated. We demonstrate similarly that authenticated data feeds, another anticipated feature of smart contract systems, can facilitate CSCs for real-world crimes. Our results illuminate the scope of possible abuses in nextgeneration cryptocurrencies. They highlight the urgency of creating policy and technical safeguards and thereby realizing the great promise of smart contracts for beneficial goals.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Raziel: Private and Verifiable Smart Contracts on Blockchains

Raziel combines secure multi-party computation and proof-carrying code to provide privacy, correctness and verifiability guarantees for smart contracts on blockchains. Effectively solving DAO and Gyges attacks, this paper describes an implementation and presents examples to demonstrate its practical viability (e.g., private and verifiable crowdfundings and investment funds, double auctions for ...

متن کامل

Examining the role of Smart Contracts in the development of the electronic registration system of documents

The document registration system is one of the most important instruments for guaranteeing the rights of individuals and preventing the occurrence of many disputes. In many developed countries, attempts have been made to change the system of registering transactions and documents. Thus, countries like the United States and Britain have changed the status of electronic registrations by adopting ...

متن کامل

overview of ways to enhance the security of video surveillance networks using blockchain

In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of  (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...

متن کامل

An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering

The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques can classify and cluster the crime-related samples. The most important factor in the c...

متن کامل

Fault Detection in Ring Based Smart LVDC Microgrid Using Ensemble of Decision Tree

In modern infrastructure, the demand for DC power-based appliances is rapidly increasing, and this phenomenon has created a positive impact on the acceptance of the DC microgrid. However, due to numerous issues such as the absence of zero crossing, bidirectional behaviour of sources, and different magnitudes of fault current during grid connected and islanded modes of operation, protecting DC m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015