MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation

Zhenshuai Yue,Haoran Zhu,Xiaolin Chang,Jelena Mišić,Vojislav B. Mišić,Junchao Fan
2024-05-07
Abstract:Traditional covert transmission (CT) approaches have been hindering CT application while blockchain technology offers new avenue. Current blockchain-based CT approaches require off-chain negotiation of critical information and often overlook the dynamic session keys updating, which increases the risk of message and key leakage. Additionally, in some approaches the covert transactions exhibit obvious characteristics that can be easily detected by third-parties. Moreover, most approaches do not address the issue of decreased reliability of message transmission in blockchain attack scenarios. Bitcoin- and Ethereum-based approaches also have the issue of transaction linkability, which can be tackled by Monero-based approaches because of the privacy protection mechanisms in Monero. However, Monero-based CT has the problem of sender repudiation. In this paper, we propose a novel Monero-Based CT approach (MBCT), which enables on-chain session key dynamically updating without off-chain negotiation. MBCT can assure non-repudiation of transmission participants, confidentiality of keys, reliability of message transmission and less observable characteristics. There are achieved by the three components in MBCT, namely, a sender authentication method, a dynamically on-chain session key updating method and a state feedback method. We implement MBCT in Monero-
Cryptography and Security
What problem does this paper attempt to address?
The problems that this paper attempts to solve mainly focus on several key issues existing in the existing blockchain - based Covert Transmission (CT) methods: 1. **Offline negotiation information leakage**: Current methods usually require off - chain negotiation of key information, which increases the risk of information and key leakage. 2. **On - chain session key leakage**: Existing methods often overlook the dynamic update of session keys, resulting in the possibility of the same key being used for a long time and being cracked, thus leaking session information. 3. **Malicious sender denying transmission behavior**: Especially in Monero - based CT, due to Monero's ring - signature mechanism, the receiver cannot determine the actual address of the sender from the transaction data, which enables the sender to deny the transmission activity. 4. **Integrity compromised due to abnormal state**: Although the blockchain has high reliability, normal transactions may not be propagated when under attack. If the sender does not know that the transaction is lost and the receiver does not know whether the information has been completely received, the integrity of the communication will be compromised. 5. **Transaction characteristics and associations leading to channel exposure**: The receiver filters covert transactions through tags. As the number of transactions increases, an attacker can expose the covert channel through statistical analysis of transaction characteristics and associations. To solve the above problems, the author proposes a Monero - based covert transmission method (MBCT), which is implemented through the following three components: 1. **Sender authentication method**: By embedding the sender's digital signature in the hidden address of the Monero transaction, the receiver can verify the sender's identity while maintaining the sender's anonymity. 2. **Dynamic on - chain session key update method**: Dynamically update the session key based on the change of the hidden address in each transaction to ensure the independence of each session and prevent the leakage of a single session key from affecting other sessions. 3. **Status feedback method**: The sender can secretly sense the communication status and re - send in a timely manner when the message is lost due to blockchain attacks or other reasons, maintaining the integrity of the communication. Through these innovations, MBCT can ensure the non - repudiation of transmission participants, the confidentiality of keys, the reliability of message transmission, and the low observability of covert transactions.