ALBATROSS: Publicly AttestabLe BATched Randomness Based On Secret Sharing

被引:32
作者
Cascudo, Ignacio [1 ]
David, Bernardo [1 ,2 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] IT Univ Copenhagen, Copenhagen, Denmark
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT III | 2020年 / 12493卷
关键词
SECURE;
D O I
10.1007/978-3-030-64840-4_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present ALBATROSS, a family of multiparty randomness generation protocols with guaranteed output delivery and public verification that allows to trade off corruption tolerance for a much improved amortized computational complexity. Our basic stand alone protocol is based on publicly verifiable secret sharing (PVSS) and is secure under in the random oracle model under the decisional Diffie-Hellman (DDH) hardness assumption. We also address the important issue of constructing Universally Composable randomness beacons, showing two UC versions of Albatross: one based on simple UC NIZKs and another one based on novel efficient "designated verifier" homomorphic commitments. Interestingly this latter version can be instantiated from a global random oracle under the weaker Computational Diffie-Hellman (CDH) assumption. An execution of ALBATROSS with n parties, out of which up to t = (1/2 - epsilon) . n are corrupt for a constant epsilon > 0, generates Theta(n(2)) uniformly random values, requiring in the worst case an amortized cost per party of Theta(log n) exponentiations per random value. We significantly improve on the SCRAPE protocol (Cascudo and David, ACNS 17), which required Theta(n(2)) exponentiations per party to generate one uniformly random value. This is mainly achieved via two techniques: first, the use of packed Shamir secret sharing for the PVSS; second, the use of linear t-resilient functions (computed via a Fast Fourier Transform-based algorithm) to improve the randomness extraction.
引用
收藏
页码:311 / 341
页数:31
相关论文
共 36 条
[1]  
[Anonymous], 1985, 26 ANN S FDN COMP SC
[2]  
[Anonymous], 1993, LECT NOTES COMPUTER, DOI DOI 10.1007/3-540-48071-4_7
[3]  
Azouvi S., 2018, CoRR
[4]   Bitcoin as a Transaction Ledger: A Composable Treatment [J].
Badertscher, Christian ;
Maurer, Ueli ;
Tschudi, Daniel ;
Zikas, Vassilis .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :324-356
[5]  
Baum C., 2020, Report 2020/207
[6]  
Ben Adida, 2008, USENIX SEC S, V17, P335
[7]  
Blakley GR, 1984, LECT NOTES COMPUTER, P242, DOI DOI 10.1007/3-540-39568-7_20
[8]   Verifiable Delay Functions [J].
Boneh, Dan ;
Bonneau, Joseph ;
Bunz, Benedikt ;
Fisch, Ben .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :757-788
[9]  
Bowe S., 2018, P INT C FIN CRYPT DA, P64, DOI [10.1007/978-3-662-58820-8_5, DOI 10.1007/978-3-662-58820-8-5]
[10]  
Bowe S., 2019, IACR Crypt. ePrint Archive, P1021