مؤتمر
zkBeacon: Proven Randomness Beacon Based on Zero-KnowledgeVerifiable Computation
العنوان: | zkBeacon: Proven Randomness Beacon Based on Zero-KnowledgeVerifiable Computation |
---|---|
المؤلفون: | Lavaur, Thomas, Lacan, Jérôme |
المساهمون: | Département d'Ingénierie des Systèmes Complexes (DISC), Institut Supérieur de l'Aéronautique et de l'Espace (ISAE-SUPAERO), Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT) |
المصدر: | Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT) ; 2022 International Conference on Security and Cryptography (SECRYPT) ; https://hal.science/hal-04067407Test ; 2022 International Conference on Security and Cryptography (SECRYPT), Jul 2022, Lisbonne, Portugal. pp.406-414 |
بيانات النشر: | HAL CCSD |
سنة النشر: | 2022 |
المجموعة: | Université Toulouse III - Paul Sabatier: HAL-UPS |
مصطلحات موضوعية: | Randomness Beacon, Random Number Generation, zk-SNARK, zk-STARK, Verifiable Computation, [SPI.OTHER]Engineering Sciences [physics]/Other |
جغرافية الموضوع: | Lisbonne, Portugal |
الوصف: | International audience ; The generation of random numbers by a trusted third-party is essential to many cryptographic protocols.Recently, the NIST proposed the standardization of randomness beacons, which are hash-based chains ofpulses. Each pulse contains a random number and is generated at regular time intervals. However, if theowner of the beacon generator is untrusted, several attacks allow the manipulation of the provided randomnumbers. In this paper, we firstly suggest protecting the first hash functions of the NIST scheme by addinga verifiable argument of knowledge. More precisely, we propose furnishing a zk-SNARK or a zk-STARKwith the hash to make the system more transparent and resistant to randomness manipulation. Secondly, wepropose a verifiable computation-based interactive protocol to allow a client, with the help of the beacon, togenerate proven randomness. Then, we show that connecting this system to a blockchain could have severalbenefits. We provide a security analysis with a model allowing a malicious beacon generator. We prove thatour first application improves the resilience of the system against randomness manipulation attacks and thatthe interactive protocol rules out timing attacks for the client and ensures the non-predictability of the randomnumbers. Finally, we evaluated the computation cost with zk-SNARKs. |
نوع الوثيقة: | conference object |
اللغة: | English |
العلاقة: | hal-04067407; https://hal.science/hal-04067407Test; https://hal.science/hal-04067407/documentTest; https://hal.science/hal-04067407/file/Lavaur_29029.pdfTest; OATAO: 29029 |
الإتاحة: | https://hal.science/hal-04067407Test https://hal.science/hal-04067407/documentTest https://hal.science/hal-04067407/file/Lavaur_29029.pdfTest |
حقوق: | info:eu-repo/semantics/OpenAccess |
رقم الانضمام: | edsbas.21F7AEDE |
قاعدة البيانات: | BASE |
الوصف غير متاح. |