SESSION ID: 21264 Consensus from Signatures of Work Giorgos Panagiotakos (U. of Edinburgh) Joint work with Juan Garay (Texas A&M) and Aggelos Kiayias (U. of Edinburgh and IOHK) #RSAC #RSAC In a nutshell Setting: synchronous, peer-to-peer, public-state setup • • Previous talk: Proofs-of-Work + Honest majority of comp. power + ROM => Consensus This talk: No ROM. Base security on weaker assumptions: Signatures-of-Work + Honest majority of comp. power + CRHF => Consensus 2 #RSAC Random Oracle Methodology Analyze protocols that use cryptographic hashes [BR93]. E.g. Bitcoin • PoW: Find ctr such that: H( ctr, H(prev, trx) ) < D • • H ≡ (SHA256)² Model H as a Random Oracle and prove security... 3 #RSAC Random Oracle Model • • H(x) uniform and independent, even for adversarial queries! Random Oracle methodology not sound [CGH98] 4 #RSAC ROM in our problem • • Known results in ROM [GKL15,AD15,GKLP18] (Implicit) ROM-based PoW schemes too strong! e.g., - Honest PoW generation algorithm optimal - 2-for-1 PoW [GKL15,GKLP18] Goal: Explicitly define and base security on a non-optimal PoW 5 #RSAC Our approach 1. 2. 3. 4. Define suitable PoW notion Non-idealized security model Implement a Transaction Ledger Implement Consensus sensus from SoW 6 #RSAC PoW • • Previous PoW definitions [DN93,Back,JJ99, SKRBN11, BGJ15,...] – Other applications: spam, DOS mitigation,.. – None shown to be sufficient Specific PoW properties in [GKL15,AD15,GKLP18]: – Non-interactive – PoW verifies some data (e.g., public keys) Similar properties found in MAC, Sig! 7 #RSAC Signatures of Work - Concept MAC, Sig: • • “A method of verifying that a certain party/set of parties approved some data” [Gol] Private knowledge allows approval In the public-state setup setting: • • • No private knowledge! Btc idea: approve data using comp. power SoW: A method of verifying that work has been spend to approve some data 8 #RSAC SoW - Syntax Classical Signatures • • • SoW (sk,vk) <- KeyGen() σ <- Sign( sk, m ) 0 or 1 <- Verify( vk, m, σ ) 1. 2. • • • vk <- KeyGen() σ <- Sign( vk, m, h ) 0 or 1 <- Verify( vk, m, σ, h ) No private knowledge => no secret key sk Moderately hard => hardness parameter h 9 #RSAC SoW - Security Properties Honest signer/verifier: • • t-Verifiable: Ver takes t steps (t,α)-Successful: Pr[ Sign(vk,m,h) runs for < t steps ] > α • Runtime independent: runtime of Sign(vk,m,h) does not depend on its inputs (weak randomness extractor => all of the above [GKP19] ) 10 #RSAC SoW - Security Properties (II) Malicious signer: • (β,ε) - Moderately Unforgeable against Tampering and Chosen Message Attacks (MU-TCMA): 11 #RSAC Security Model Revisited In [GKL15,AD15,GKLP18]: • • • Synchronous, peer-to-peer, public state setup Fixed number of parties n, t corrupted Bounded number of RO queries per round Instead, concrete bounds: • • • Adversary’s steps per round < tA Honest parties’ steps per round < tH #messages per round < θ 12 #RSAC Robust Public Transaction Ledger [GKL15] • • Persistence: ∃P reports tx stable at pos i => ∀P report tx stable and at pos i Liveness: non-conflicting tx provided as input long enough => ∀P report tx stable 13 #RSAC SoW-based Ledger Similar to Bitcoin.. • • Blocks connected using C.R. hash: s’ = Gk( s, Gk(m), σ) Each block contains a SoW: Ver( s, Gk(m), σ, h) 14 #RSAC Security Proof • • MU-TCMA => #adversarial blocks < ... Runtime Independence + Successful => #uniquely successful rounds > ... If additionally: • • • Honest majority in comp. power Good SoW scheme ( α ≈ βtH) Bounded SoW generation rate => Public Transaction Ledger [GKL15] 15 #RSAC Consensus n parties, t corrupt. Each party takes an input in {0,1} Consensus protocol definition: • • • Agreement: all honest parties output the same value Validity: if all honest parties take the same input b, output b Termination: all parties output some value eventually 16 #RSAC Consensus protocol in ROM • • Consensus not immediate [selfish mining attack] Solution in ROM: 2-for-1 PoW [GKL15] Block PoW: Trx PoW: • D<2 к/2 H( ctr, H( prev, block, trx) ) < D H( ctr, H( prev, block, trx) ) > 2к - D => independent events! Can we avoid the extra property? 17 #RSAC Consensus protocol Idea: chain agreement => block tree agreement 18 [Inclusive,...] #RSAC Consensus protocol (II) Protocol: • • • Blockchain extension/selection as in Bitcoin Blocks contain off-chain headers and vote SoW can be verifie

pdf文档 2020_USA20_CRYP-W11_01_Consensus-from-Signatures-of-Work

安全研究库 > 国外研究报告 > 密码学 > 文档预览
21 页 0 下载 29 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2020_USA20_CRYP-W11_01_Consensus-from-Signatures-of-Work 第 1 页 2020_USA20_CRYP-W11_01_Consensus-from-Signatures-of-Work 第 2 页 2020_USA20_CRYP-W11_01_Consensus-from-Signatures-of-Work 第 3 页 2020_USA20_CRYP-W11_01_Consensus-from-Signatures-of-Work 第 4 页 2020_USA20_CRYP-W11_01_Consensus-from-Signatures-of-Work 第 5 页
下载文档到电脑,方便使用
还有 16 页可预览,继续阅读
本文档由 张玉竹2022-04-08 09:48:17上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言