-
Fair and Decentralized Exchange of Digital Goods
Authors:
Ariel Futoransky,
Carlos Sarraute,
Daniel Fernandez,
Matias Travizano,
Ariel Waissbein
Abstract:
We construct a privacy-preserving, distributed and decentralized marketplace where parties can exchange data for tokens. In this market, buyers and sellers make transactions in a blockchain and interact with a third party, called notary, who has the ability to vouch for the authenticity and integrity of the data.
We introduce a protocol for the data-token exchange where neither party gains more…
▽ More
We construct a privacy-preserving, distributed and decentralized marketplace where parties can exchange data for tokens. In this market, buyers and sellers make transactions in a blockchain and interact with a third party, called notary, who has the ability to vouch for the authenticity and integrity of the data.
We introduce a protocol for the data-token exchange where neither party gains more information than what it is paying for, and the exchange is fair: either both parties gets the other's item or neither does. No third party involvement is required after setup, and no dispute resolution is needed.
△ Less
Submitted 22 February, 2020;
originally announced February 2020.
-
WibsonTree: Efficiently Preserving Seller's Privacy in a Decentralized Data Marketplace
Authors:
Ariel Futoransky,
Carlos Sarraute,
Ariel Waissbein,
Matias Travizano,
Daniel Fernandez
Abstract:
We present a cryptographic primitive called WibsonTree designed to preserve users' privacy by allowing them to demonstrate predicates on their personal attributes, without revealing the values of those attributes. We suppose that there are three types of agents --buyers, sellers and notaries-- who interact in a decentralized privacy-preserving data marketplace (dPDM) such as the Wibson marketplace…
▽ More
We present a cryptographic primitive called WibsonTree designed to preserve users' privacy by allowing them to demonstrate predicates on their personal attributes, without revealing the values of those attributes. We suppose that there are three types of agents --buyers, sellers and notaries-- who interact in a decentralized privacy-preserving data marketplace (dPDM) such as the Wibson marketplace. We introduce the WibsonTree protocol as an efficient cryptographic primitive that enables the exchange of private information while preserving the seller's privacy. Using our primitive, a data seller can efficiently prove that he/she belongs to the target audience of a buyer's data request, without revealing any additional information.
△ Less
Submitted 10 February, 2020;
originally announced February 2020.
-
Secure Exchange of Digital Goods in a Decentralized Data Marketplace
Authors:
Ariel Futoransky,
Carlos Sarraute,
Ariel Waissbein,
Daniel Fernandez,
Matias Travizano,
Martin Minnoni
Abstract:
We are tackling the problem of trading real-world private information using only cryptographic protocols and a public blockchain to guarantee honest transactions. In this project, we consider three types of agents --buyers, sellers and notaries-- interacting in a decentralized privacy-preserving data marketplace (dPDM) such as the Wibson data marketplace. This framework offers infrastructure and f…
▽ More
We are tackling the problem of trading real-world private information using only cryptographic protocols and a public blockchain to guarantee honest transactions. In this project, we consider three types of agents --buyers, sellers and notaries-- interacting in a decentralized privacy-preserving data marketplace (dPDM) such as the Wibson data marketplace. This framework offers infrastructure and financial incentives for individuals to securely sell personal information while preserving personal privacy. Here we provide an efficient cryptographic primitive for the secure exchange of data in a dPDM, which occurs as an atomic operation wherein the data buyer gets access to the data and the data seller gets paid simultaneously.
△ Less
Submitted 29 July, 2019;
originally announced July 2019.
-
An attack on MySQL's login protocol
Authors:
Ivan Arce,
Emiliano Kargieman,
Gerardo Richarte,
Carlos Sarraute,
Ariel Waissbein
Abstract:
The MySQL challenge-and-response authentication protocol is proved insecure. We show how can an eavesdropper impersonate a valid user after witnessing only a few executions of this protocol. The algorithm of the underlying attack is presented. Finally we comment about implementations and statistical results.
The MySQL challenge-and-response authentication protocol is proved insecure. We show how can an eavesdropper impersonate a valid user after witnessing only a few executions of this protocol. The algorithm of the underlying attack is presented. Finally we comment about implementations and statistical results.
△ Less
Submitted 11 June, 2010;
originally announced June 2010.
-
Advanced Software Protection Now
Authors:
Diego Bendersky,
Ariel Futoransky,
Luciano Notarfrancesco,
Carlos Sarraute,
Ariel Waissbein
Abstract:
Software digital rights management is a pressing need for the software development industry which remains, as no practical solutions have been acclamaimed succesful by the industry. We introduce a novel software-protection method, fully implemented with today's technologies, that provides traitor tracing and license enforcement and requires no additional hardware nor inter-connectivity.
Our work…
▽ More
Software digital rights management is a pressing need for the software development industry which remains, as no practical solutions have been acclamaimed succesful by the industry. We introduce a novel software-protection method, fully implemented with today's technologies, that provides traitor tracing and license enforcement and requires no additional hardware nor inter-connectivity.
Our work benefits from the use of secure triggers, a cryptographic primitive that is secure assuming the existence of an ind-cpa secure block cipher. Using our framework, developers may insert license checks and fingerprints, and obfuscate the code using secure triggers. As a result, this rises the cost that software analysis tools have detect and modify protection mechanisms. Thus rising the complexity of cracking this system.
△ Less
Submitted 11 June, 2010;
originally announced June 2010.