Time-Lock Puzzles from Randomized Encodings

被引:76
作者
Bitansky, Nir [1 ]
Goldwasser, Shafi [1 ,2 ]
Jain, Abhishek [3 ]
Paneth, Omer [4 ]
Vaikuntanathan, Vinod [1 ]
Waters, Brent [5 ]
机构
[1] MIT, Cambridge, MA 02139 USA
[2] Weizmann Inst Sci, Rehovot, Israel
[3] Johns Hopkins Univ, Baltimore, MD 21218 USA
[4] Boston Univ, Boston, MA 02215 USA
[5] UT Austin, Austin, TX USA
来源
ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE | 2016年
关键词
POLYNOMIALS;
D O I
10.1145/2840728.2840745
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Time-lock puzzles are a mechanism for sending messages "to the future". A sender can quickly generate a puzzle with a solution s that remains hidden until a moderately large amount of time t has elapsed. The solution s should be hidden from any adversary that runs in time significantly less than t, including resourceful parallel adversaries with polynomially many processors. While the notion of time-lock puzzles has been around for 22 years, there has only been a single candidate proposed. Fifteen years ago, Rivest, Shamir and Wagner suggested a beautiful candidate time-lock puzzle based on the assumption that exponentiation modulo an RSA integer is an "inherently sequential" computation. We show that various flavors of randomized encodings give rise to time-lock puzzles of varying strengths, whose security can be shown assuming the mere existence of non-parallelizing languages, which are languages that require circuits of depth at least t to decide, in the worst-case. The existence of such languages is necessary for the existence of time-lock puzzles. We instantiate the construction with different randomized encodings from the literature, where increasingly better efficiency is obtained based on increasingly stronger cryptographic assumptions, ranging from one-way functions to indistinguishability obfuscation. We also observe that time-lock puzzles imply one-way functions, and thus the reliance on some cryptographic assumption is necessary. Finally, generalizing the above, we construct other types of puzzles such as proofs of work from randomized encodings and a suitable worst-case hardness assumption (that is necessary for such puzzles to exist).
引用
收藏
页码:345 / 356
页数:12
相关论文
共 29 条
[1]  
Ananth P., 2015, CRYPTO
[2]  
[Anonymous], 2015, FOCS
[3]  
[Anonymous], BITCOIN PEER TO PEER
[4]  
[Anonymous], 2001, FDN CRYPTOGRAPHY
[5]  
[Anonymous], 1982, 23 ANN S FDN COMP SC
[6]   Computationally private randomizing polynomials and their applications [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
COMPUTATIONAL COMPLEXITY, 2006, 15 (02) :115-162
[7]  
Barak B., 2002, Randomization and Approximation Techniques in Computer Science. 6th International Workshop, RANDOM 2002. Proceedings (Lecture Notes in Computer Science Vol.2483), P194
[8]  
Bitansky N, 2015, S THEOR COMP STOC 20
[9]  
Boneh D, 2000, LECT NOTES COMPUT SC, V1880, P236
[10]  
Canetti R., 2015, S THEOR COMP STOC 20