首页> 外文会议>Annual International Cryptology Conference >PoW-Based Distributed Cryptography with No Trusted Setup
【24h】

PoW-Based Distributed Cryptography with No Trusted Setup

机译:基于POW的分布式加密,没有受信任的设置

获取原文

摘要

Motivated by the recent success of Bitcoin we study the question of constructing distributed cryptographic protocols in a fully peer-to-peer scenario under the assumption that the adversary has limited computing power and there is no trusted setup (like PKI, or an unpredictable beacon). We propose a formal model for this scenario and then we construct a broadcast protocol in it. This protocol is secure under the assumption that the honest parties have computing power that is some non-negligible fraction of computing power of the adversary (this fraction can be small, in particular it can be much less than 1/2), and a (rough) total bound on the computing power in the system is known. Using our broadcast protocol we construct a protocol for simulating any trusted functionality. A simple application of the broadcast protocol is also a scheme for generating an unpredictable beacon (that can later serve, e.g., as a genesis block for a new cryptocurrency). Under a stronger assumption that the majority of computing power is controlled by the honest parties we construct a protocol for simulating any trusted functionality with guaranteed termination (i.e. that cannot be interrupted by the adversary). This could in principle be used as a provably-secure substitute of the blockchain technology used in the cryptocurrencies. Our main tool for verifying the computing power of the parties are the Proofs of Work (Dwork and Naor, CRYPTO 92). Our broadcast protocol is built on top of the classical protocol of Dolev and Strong (SIAM J. on Comp. 1983).
机译:最近比特币成功的推动我们研究了在主对手有限的假设下在完全对等方案中构建分布式加密协议的问题,并且没有受信任的设置(如PKI,或不可预测的信标) 。我们为此方案提出了一个正式模型,然后我们在其中构建广播协议。该协议在假设诚信方具有计算能力的假设下是安全的,这是对手的一些不可忽略的计算能力(该级分也很小,特别是它可以小于1/2),并且(粗略)系统中计算能力的总绑定。使用我们的广播协议,我们构建一个用于模拟任何可信功能的协议。广播协议的简单应用也是一种用于生成不可预测信标的方案(其稍后可以为新的加密货币提供的成因块)。在较强的假设下,大多数计算能力由诚实的缔约方控制,我们构建一个用于模拟任何可信任的功能的协议(即不能被对手打断)。这原则上可以用作隐含货币中使用的区块链技术的可透明的替代品。我们的主要工具用于验证各方的计算能力是工作证明(DWORK和NAOR,CRYPTO 92)。我们的广播协议建立在Dolev和Contrance的经典协议之上(Siam J.在Comp.1983)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号