PoW-Based Distributed Cryptography with No Trusted Setup

被引:46
作者
Andrychowicz, Marcin [1 ]
Dziembowski, Stefan [1 ]
机构
[1] Univ Warsaw, Warsaw, Poland
来源
ADVANCES IN CRYPTOLOGY, PT II | 2015年 / 9216卷
关键词
D O I
10.1007/978-3-662-48000-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Motivated by the recent success of Bitcoin we study the question of constructing distributed cryptographic protocols in a fully peer-to-peer scenario under the assumption that the adversary has limited computing power and there is no trusted setup (like PKI, or an unpredictable beacon). We propose a formal model for this scenario and then we construct a broadcast protocol in it. This protocol is secure under the assumption that the honest parties have computing power that is some non-negligible fraction of computing power of the adversary (this fraction can be small, in particular it can be much less than 1/2), and a (rough) total bound on the computing power in the system is known. Using our broadcast protocol we construct a protocol for simulating any trusted functionality. A simple application of the broadcast protocol is also a scheme for generating an unpredictable beacon (that can later serve, e.g., as a genesis block for a new cryptocurrency). Under a stronger assumption that the majority of computing power is controlled by the honest parties we construct a protocol for simulating any trusted functionality with guaranteed termination (i.e. that cannot be interrupted by the adversary). This could in principle be used as a provably-secure substitute of the blockchain technology used in the cryptocurrencies. Our main tool for verifying the computing power of the parties are the Proofs of Work (Dwork and Naor, CRYPTO 92). Our broadcast protocol is built on top of the classical protocol of Dolev and Strong (SIAM J. on Comp. 1983).
引用
收藏
页码:379 / 399
页数:21
相关论文
共 28 条
[1]  
Adam Back, 2002, HASHCASH A DENIAL SE
[2]  
Andrychowicz Marcin, 2014, 2014796 CRYPT EPRINT
[3]  
Aspnes J., 2005, TECHNICAL REPORT
[4]  
Babai L., 1985, STOC, P421, DOI DOI 10.1145/22145.22192
[5]  
Bahack V., 2013, ARXIV13127013
[6]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[7]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[8]  
Bogetoft P, 2009, LECT NOTES COMPUT SC, V5628, P325, DOI 10.1007/978-3-642-03549-4_20
[9]  
Canetti R., 2002, STOC, P494, DOI DOI 10.1145/509907.509980
[10]  
Canetti Ran, 2001, FOCS