Bringing Smart Contract Confidentiality Via Trusted Hardware: Fact and Fiction

Rujia Li,Qin Wang,Yuanzhao Li,Sisi Duan,Qi Wang,David Galindo
DOI: https://doi.org/10.1109/tifs.2024.3484291
IF: 7.231
2024-01-01
IEEE Transactions on Information Forensics and Security
Abstract:Trusted Execution Environment (TEE)-assisted confidential smart contracts (TCSC) have attracted extensive attention from both academia and industry. Despite an enormous number of TCSC projects, the extent of confidentiality offered by them remains being questioned: the factual and fictional aspects are not well distinguished, which limits their adoption. In this paper, we provide a formal treatment of TCSC, endowing them with an expressive syntax and multiple security definitions. Then, we present a provably secure TCSC instantiation under our definitions. We correspondingly identify the implementation flaws in each algorithm that may make a TCSC system violate its security properties. The analysis reveals the gap between the model and the real-world system: even assuming a TCSC is provably secure, it may fail to be secure in practice. We further compare our TCSC instantiation with 16 representative TCSC systems. Our results surprisingly show that all these surveyed projects are subject to practical attacks.
What problem does this paper attempt to address?