zkBeacon: Proven Randomness Beacon Based on Zero-KnowledgeVerifiable Computation

التفاصيل البيبلوغرافية
العنوان: zkBeacon: Proven Randomness Beacon Based on Zero-KnowledgeVerifiable Computation
المؤلفون: Lavaur, Thomas, Lacan, Jérôme
المساهمون: Département d'Ingénierie des Systèmes Complexes (DISC), Institut Supérieur de l'Aéronautique et de l'Espace (ISAE-SUPAERO), Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)
المصدر: Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT) ; 2022 International Conference on Security and Cryptography (SECRYPT) ; https://hal.science/hal-04067407Test ; 2022 International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbonne, Portugal. pp.406-414
بيانات النشر: HAL CCSD
سنة النشر: 2022
المجموعة: Université Toulouse III - Paul Sabatier: HAL-UPS
مصطلحات موضوعية: Randomness Beacon, Random Number Generation, zk-SNARK, zk-STARK, Verifiable Computation, [SPI.OTHER]Engineering Sciences [physics]/Other
جغرافية الموضوع: Lisbonne, Portugal
الوصف: International audience ; The generation of random numbers by a trusted third-party is essential to many cryptographic protocols.Recently, the NIST proposed the standardization of randomness beacons, which are hash-based chains ofpulses. Each pulse contains a random number and is generated at regular time intervals. However, if theowner of the beacon generator is untrusted, several attacks allow the manipulation of the provided randomnumbers. In this paper, we firstly suggest protecting the first hash functions of the NIST scheme by addinga verifiable argument of knowledge. More precisely, we propose furnishing a zk-SNARK or a zk-STARKwith the hash to make the system more transparent and resistant to randomness manipulation. Secondly, wepropose a verifiable computation-based interactive protocol to allow a client, with the help of the beacon, togenerate proven randomness. Then, we show that connecting this system to a blockchain could have severalbenefits. We provide a security analysis with a model allowing a malicious beacon generator. We prove thatour first application improves the resilience of the system against randomness manipulation attacks and thatthe interactive protocol rules out timing attacks for the client and ensures the non-predictability of the randomnumbers. Finally, we evaluated the computation cost with zk-SNARKs.
نوع الوثيقة: conference object
اللغة: English
العلاقة: hal-04067407; https://hal.science/hal-04067407Test; https://hal.science/hal-04067407/documentTest; https://hal.science/hal-04067407/file/Lavaur_29029.pdfTest; OATAO: 29029
الإتاحة: https://hal.science/hal-04067407Test
https://hal.science/hal-04067407/documentTest
https://hal.science/hal-04067407/file/Lavaur_29029.pdfTest
حقوق: info:eu-repo/semantics/OpenAccess
رقم الانضمام: edsbas.21F7AEDE
قاعدة البيانات: BASE