Verifiable Timed Signatures Made Practical

被引:31
作者
Thyagarajan, Aravinda Krishnan [1 ]
Bhat, Adithya [2 ]
Malavolta, Giulio [3 ,4 ]
Doettling, Nico [5 ]
Kate, Aniket [2 ]
Schroeder, Dominique [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg, Erlangen, Germany
[2] Purdue Univ, W Lafayette, IN 47907 USA
[3] Univ Calif Berkeley, Berkeley, CA USA
[4] CMU, Pittsburgh, PA USA
[5] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
来源
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2020年
基金
美国国家科学基金会;
关键词
Timed signatures; Time lock puzzles; Payment Channel Network; Multi-party signing; IDENTIFICATION;
D O I
10.1145/3372297.3417263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for a given amount of time T such that after performing a sequential computation for time T anyone can extract the signature from the time-lock. Verifiability ensures that anyone can publicly check if a time-lock contains a valid signature on the message without solving it first, and that the signature can be obtained by solving the same for time T. This work formalizes VTS, presents efficient constructions compatible with BLS, Schnorr, and ECDSA signatures, and experimentally demonstrates that these constructions can be employed in practice. On a technical level, we design an efficient cut-and-choose protocol based on the homomorphic time-lock puzzles to prove the validity of a signature encapsulated in a time-lock puzzle. We also present a new efficient range proof protocol that significantly improves upon existing proposals in terms of the proof size, and is also of independent interest. While VTS is a versatile tool with numerous existing applications, we demonstrate VTS's applicability to resolve three novel challenging issues in the space of cryptocurrencies. Specifically, we show how VTS is the cryptographic cornerstone to construct: (i) Payment channel networks with improved on-chain unlinkability of users involved in a transaction, (ii) multi-party signing of transactions for cryptocurrencies without any on-chain notion of time and (iii) cryptocurrency-enabled fair multi-party computation protocol.
引用
收藏
页码:1733 / 1750
页数:18
相关论文
共 48 条
[1]   How to Garble Arithmetic Circuits [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :120-129
[2]   Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks [J].
Bagaria, Vivek ;
Neu, Joachim ;
Tse, David .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12059 :304-324
[3]   Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts [J].
Banasik, Waclaw ;
Dziembowski, Stefan ;
Malinowski, Daniel .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :261-280
[4]   Zerocash: Decentralized Anonymous Payments from Bitcoin [J].
Ben-Sasson, Eli ;
Chiesa, Alessandro ;
Garmant, Christina ;
Green, Matthew ;
Miers, Ian ;
Tromer, Eran ;
Virza, Madars .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :459-474
[5]  
Bentov I, 2014, LECT NOTES COMPUT SC, V8617, P421, DOI 10.1007/978-3-662-44381-1_24
[6]   Time-Lock Puzzles from Randomized Encodings [J].
Bitansky, Nir ;
Goldwasser, Shafi ;
Jain, Abhishek ;
Paneth, Omer ;
Vaikuntanathan, Vinod ;
Waters, Brent .
ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, :345-356
[7]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[8]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[9]  
Boneh D, 2000, LECT NOTES COMPUT SC, V1880, P236
[10]  
Boneh D, 2018, LECT NOTES COMPUT SC, V11273, P435, DOI 10.1007/978-3-030-03329-3_15