Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications

نویسندگان

چکیده

Time-lock puzzles are elegant protocols that enable a party to lock message such no one else can unlock it until certain time elapses. Nevertheless, existing schemes not suitable for the case where server is given multiple instances of puzzle scheme at once and must them different points in time. If naively used this setting, then has start solving all as soon receives them, ultimately imposes significant computation cost demands high level parallelisation. We put forth formally define primitive called “multi-instance time-lock puzzle” which allows composing puzzle’s instances. propose candidate construction: “chained (C-TLP). It server, instances’ composition, solve sequentially, without having run parallel computations on them. C-TLP makes black-box use standard accompanied by lightweight publicly verifiable algorithm. first offers combination above features. build “outsourced proofs retrievability” support real-time detection fair payment while lower overhead than state art. As another application C-TLP, we illustrate cases, substitute “verifiable delay function” with gain much better efficiency.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Publicly Verifiable Lotteries: Applications of Delaying Functions

This paper uses delaying functions, functions that require signiicant calculation time, in the development of a one-pass lottery scheme in which winners are chosen fairly using only internal information. Since all this information may be published (even before the lottery closes), anyone can do the calculation and therefore verify that the winner was chosen correctly. Since the calculation uses...

متن کامل

An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme

Multi-signcryption is used when different senders wants to authenticate a single message without revealing it. This paper proposes a multi signcryption scheme in which no pairing is computed on the signcryption stage and the signatures can be verified publicly.

متن کامل

A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications

Abs t rac t . A publicly verifiable secret sharing (PVSS) scheme, named by Stadler in [Sta96], is a special VSS scheme in which anyone, not only the shareholders, can verify that the secret shares are correctly distributed. The property of public verifiability is what the first proposed VSS scheme [CGMA85] incorporated but later protocols [GMW87, Fe187, Ped911 failed to include. PVSS can provid...

متن کامل

Publicly Verifiable Ciphertexts

In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can ...

متن کامل

Hybrid Publicly Verifiable Computation

Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations to more powerful servers, and to verify the correctness of results. Delegation and verification rely only on public parameters, and thus PVC lends itself to large multi-user systems where entities need not be registered. In such settings, individual user requirements may be diverse and cannot be realis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-662-64331-0_28