Homomorphic Time-Lock Puzzles and Applications

被引:57
作者
Malavolta, Giulio [1 ]
Thyagarajan, Sri Aravinda Krishnan [2 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Friedrich Alexander Univ Erlangen Nurnberg, Erlangen, Germany
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1 | 2019年 / 11692卷
关键词
D O I
10.1007/978-3-030-26948-7_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Time-lock puzzles allow one to encrypt messages for the future, by efficiently generating a puzzle with a solution s that remains hidden until time T has elapsed. The solution is required to be concealed from the eyes of any algorithm running in (parallel) time less than T. We put forth the concept of homomorphic time-lock puzzles, where one can evaluate functions over puzzles without solving them, i.e., one can manipulate a set of puzzles with solutions (s(1), ..., s(n)) to obtain a puzzle that solves to f(s(1), ..., s(n)), for any function f. We propose candidate constructions under concrete cryptographic assumptions for different classes of functions. Then we show how homomorphic time-lock puzzles overcome the limitations of classical time-lock puzzles by proposing new protocols for applications of interest, such as e-voting, multi-party coin flipping, and fair contract signing.
引用
收藏
页码:620 / 649
页数:30
相关论文
共 32 条
  • [1] [Anonymous], 2018, 2018623 CRYPT EPRINT
  • [2] [Anonymous], 1990, FOCS 1990
  • [3] [Anonymous], 1996, TECHNICAL REPORT
  • [4] Time-Lock Puzzles from Randomized Encodings
    Bitansky, Nir
    Goldwasser, Shafi
    Jain, Abhishek
    Paneth, Omer
    Vaikuntanathan, Vinod
    Waters, Brent
    [J]. ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, : 345 - 356
  • [5] Succinct Randomized Encodings and their Applications
    Bitansky, Nir
    Garg, Sanjam
    Lin, Huijia
    Pass, Rafael
    Telang, Sidharth
    [J]. STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, : 439 - 448
  • [6] Blum M., 1982, 23rd Annual Symposium on Foundations of Computer Science, P112, DOI 10.1109/SFCS.1982.72
  • [7] Boneh D, 2000, LECT NOTES COMPUT SC, V1880, P236
  • [8] Boneh D., 2018, 2018712 CRYPT EPRINT
  • [9] Threshold Cryptosystems from Threshold Fully Homomorphic Encryption
    Boneh, Dan
    Gennaro, Rosario
    Goldfeder, Steven
    Jain, Aayush
    Kim, Sam
    Rasmussen, Peter M. R.
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 565 - 596
  • [10] Verifiable Delay Functions
    Boneh, Dan
    Bonneau, Joseph
    Bunz, Benedikt
    Fisch, Ben
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 757 - 788