BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

Authors

DOI:

https://doi.org/10.5195/ledger.2016.27

Keywords:

Security, Privacy, Anonymity, Blockchain, Bitcoin, Public keys, Cryptography, Validation

Abstract

With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI) as a distributed public ledger is also briefly described. 

Author Biography

Sead Muftic, SETECS, Inc. - Washington, DC Royal Institute of Technology - Stockholm

CEO, SETECS Inc.

References

Andreesen, M. “Why Bitcoin Matters”, The New York Times (2014)

Bamert, T., Decker, C., Wattenhofer, R., Welten, S. “BlueWallet: The Secure Bitcoin Wallet.” In Security and Trust Management. Springer 65–80 (2014)

bin Abdullah, N. Security Architecture and Protocols for Protection, Privacy, and Anonymity of Users and Transactions. Licentiate Thesis ICT/KTH (November 2015)

Buterin, V., “Secret Sharing and Erasure Coding: A Guide for the Aspiring Dropbox Decentralizer.” Ethereum Blog (16 August 2014) https://blog.ethereum.org/2014/08/16/secret- sharing-erasure-coding-guide-aspiring-dropbox-decentralizer/

Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W. “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”, IETF RFC 5280 (2008)

Goldfeder, S., Gennaro, R., Kalodner, H., Bonneau, J., Kroll, J. A., Felten, E. W., Narayanan, A. “Securing Bitcoin Wallets via Threshold Signatures.” No Publisher (2014) http://www.cs.princeton.edu/~stevenag/bitcoin_threshold_signatures.pdf

Kounelis, J. Secure and Trusted Mobile Commerce System based on Virtual Currencies. Ph.D. dissertation ICT/KTH (November 2015)

Larcheveque, E. “Bitcoin address authentication protocol (BitID).” No Publisher (2014)

https://github.com/bitid/bitid/blob/master/BIP_draft.md

Muftic, S. “Security, Privacy, and Anonymity of Peer–to–Peer Transactions.” Lecture notes EIT Digital, University of Trento (November 2015)

Muftic, S., bin Abbdullah, N., Kounelis, I. “Business Information Exchange System with Security, Privacy, and Anonymity.” Journal of Electrical and Computer Engineering 2016 1-10 (2016) doi:10.1155/2016/7093642

Nakamoto, S., “Bitcoin: A Peer-to-Peer Electronic Cash System.” No Publisher

https://bitcoin.com/bitcoin.pdf

No Author. “Bitcoin revealed: a Ponzi scheme for redistributing wealth from one libertarian to another.” Washington Post (January 2015)

No Author. “Cyber-Extortionists Targeting the Financial Sector Are Demanding Bitcoin Ransoms.” Bloomberg Business (September 2015)

No Author. “Extensible Messaging and Presence Protocol.” XMPP Standards Foundation www.xmpp.org

No Author. “XEP–0080: User Location.” XMPP Standards Foundation www.xmpp.org/extensions/xep- 0080.html

Pedro, F., Understanding Bitcoin: Cryptography, Engineering and Economics. Wiley Finance Series (2014) ISBN: 978-1-119-01916-9

Pseudonymous (MysteryMiner). “Easywallet.org wallets compromised – Uninstall Google Chrome spyware right now!” Bitcoin Forum (10 April 2013) https://bitcointalk.org/index.php?topic=172527.0

Ratnayake, Y. SDMS: Secure Documents Management System. M.Sc. thesis ICT/KTH (November 2015)

Shibli, A., et al. “Security Analysis of Bitcoin System (Vulnerabilities, Threats and Defense Techniques).” Unpublished manuscript

Sparkes, M., “The coming digital anarchy,” In The Telegraph (June 2014) http://www.telegraph.co.uk/technology/news/10881213/The-coming-digital- anarchy.html

Svensson, D. SecuRES: Secure Resource Sharing System. M.Sc. thesis ICT/KTH (June 2015)

Wilkinson, S. “Storj: A Peer-to-Peer Cloud Storage Network.” No Publisher (15 December 2014)

http://storj.io/storj.pdf

Additional Files

Published

2016-12-21

How to Cite

Muftic, S. (2016). BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger. Ledger, 1, 19–37. https://doi.org/10.5195/ledger.2016.27

Issue

Section

Research Articles