Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains

被引:2
作者
Shi, Yang [1 ]
Luo, Tianyuan [1 ]
Liang, Jingwen [1 ]
Au, Man Ho [2 ,3 ]
Luo, Xiapu [3 ]
机构
[1] Tongji Univ, Sch Software Engn, Shanghai 200070, Peoples R China
[2] Univ Hong Kong, Shenzhen Inst Res & Innovat, Shenzhen 518063, Guangdong, Peoples R China
[3] Hong Kong Polytech Univ, Dept Comp, Hung Hom, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchains; Cryptography; Security; Protocols; Costs; Computer hacking; Hardware; program obfuscation; proof-of-stake; verifiable random functions; SIGNATURES;
D O I
10.1109/TDSC.2023.3321051
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain systems enable new applications, such as cryptocurrencies and smart contracts, using decentralized consensus without trusted authorities. A number of blockchain systems based on proof-of-stake techniques have been proposed, many of which use verifiable random functions (VRFs) as fundamental building blocks, such as Ouroboros, Algorand, and Dfinity, etc. The secret key of a VRF scheme is critical to the security of a VRF and the entire blockchain system built on it. To protect the secret keys of VRFs and maintain the efficiency of the proof-of-stake protocol, we extend the objective of cryptographic program obfuscation to VRFs and propose an obfuscatable VRF scheme. In particular, we propose an obfuscator that can transform the implementation of the scheme's random string generation algorithm and the given secret key into an unintelligible form. Obfuscated implementations of the random string generation algorithm are deployed on peers of a blockchain for supporting normal routines of the proof-of-stake protocol. Even if a hacker has controlled a peer's host, the owner's secret key will not be compromised because the key has been hardwired into the obfuscated implementation in an "encrypted manner". We formally prove the correctness and the security of the proposed VRF and obfuscator. Since the proposed scheme supports the general semantics of verifiable random functions, it can be used as a building block for all blockchain systems that adopt proof-of-stake protocols based on VRFs. The experimental result indicated that the scheme performs well on various platforms, such as cloud servers, workstations, smartphones, and embedded devices.
引用
收藏
页码:2982 / 2996
页数:15
相关论文
共 62 条
[1]  
Abdalla M, 2000, LECT NOTES COMPUT SC, V1976, P116
[2]   Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions [J].
Abdalla, Michel ;
Catalano, Dario ;
Fiore, Dario .
JOURNAL OF CRYPTOLOGY, 2014, 27 (03) :544-593
[3]  
Abraham D., 2018, Cryptology ePrint Archive, Rep. 2018/1153
[4]  
Aydar M, 2020, Arxiv, DOI arXiv:1907.04156
[5]   Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability [J].
Badertscher, Christian ;
Gazi, Peter ;
Kiayias, Aggelos ;
Russell, Alexander ;
Zikas, Vassilis .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :913-930
[6]  
Barak B., 2001, P ANN INT CRYPT C, P1
[7]   On the (Im)possibility of Obfuscating Programs [J].
Barak, Boaz ;
Goldreich, Oded ;
Impagliazzo, Russell ;
Rudich, Steven ;
Sahai, Amit ;
Vadhan, Salil ;
Yang, Ke .
JOURNAL OF THE ACM, 2012, 59 (02)
[8]  
Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P431
[9]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[10]  
Buterin Vitalik, 2017, arXiv