신뢰실행환경(TEE) 기반의 블록체인 오프라인 결제 프로토콜

Vol. 34, No. 5, pp. 1021-1035, 10월. 2024
10.13089/JKIISC.2024.34.5.1021, Full Text:
Keywords: Blockchain, Offline Payment, Trusted Execution Environment (TEE)
Abstract

This paper proposes the TEE-BOP (Trusted Execution Environment-Based Blockchain Offline Payment) protocol for blockchain-based offline payments. TEE-BOP securely manages offline balances within a Trusted Execution Environment (TEE) and efficiently verifies initial deposit proofs recorded on the blockchain using Merkle trees. Additionally, it ensures secure and tamper-proof transactions in offline environments by guaranteeing the reliability of keys and the system through TEE Attestation. Unlike previous studies, TEE-BOP enhances real-world applicability by eliminating dependence on central authorities and avoiding assumptions of ideal models. The protocol solves the double-spending problem through multi-layered defense mechanisms and addresses forgery prevention by allowing recipients to directly verify data consistency between the TEE and the blockchain. This enables reliable blockchain-based offline payments in areas with unstable network infrastructure. It demonstrates that this research can expand the application of blockchain technology and contribute to improving access to financial services in developing countries or disaster situations.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
정동현, 이중희, 김범중, "Trusted Execution Environment (TEE)-Based Blockchain Offline Payment Protocol," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 5, pp. 1021-1035, 2024. DOI: 10.13089/JKIISC.2024.34.5.1021.

[ACM Style]
정동현, 이중희, and 김범중. 2024. Trusted Execution Environment (TEE)-Based Blockchain Offline Payment Protocol. Journal of The Korea Institute of Information Security and Cryptology, 34, 5, (2024), 1021-1035. DOI: 10.13089/JKIISC.2024.34.5.1021.