Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications
نویسندگان
چکیده
Time-lock puzzles are elegant protocols that enable a party to lock message such no one else can unlock it until certain time elapses. Nevertheless, existing schemes not suitable for the case where server is given multiple instances of puzzle scheme at once and must them different points in time. If naively used this setting, then has start solving all as soon receives them, ultimately imposes significant computation cost demands high level parallelisation. We put forth formally define primitive called “multi-instance time-lock puzzle” which allows composing puzzle’s instances. propose candidate construction: “chained (C-TLP). It server, instances’ composition, solve sequentially, without having run parallel computations on them. C-TLP makes black-box use standard accompanied by lightweight publicly verifiable algorithm. first offers combination above features. build “outsourced proofs retrievability” support real-time detection fair payment while lower overhead than state art. As another application C-TLP, we illustrate cases, substitute “verifiable delay function” with gain much better efficiency.
منابع مشابه
Publicly Verifiable Lotteries: Applications of Delaying Functions
This paper uses delaying functions, functions that require signiicant calculation time, in the development of a one-pass lottery scheme in which winners are chosen fairly using only internal information. Since all this information may be published (even before the lottery closes), anyone can do the calculation and therefore verify that the winner was chosen correctly. Since the calculation uses...
متن کاملAn Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme
Multi-signcryption is used when different senders wants to authenticate a single message without revealing it. This paper proposes a multi signcryption scheme in which no pairing is computed on the signcryption stage and the signatures can be verified publicly.
متن کاملA Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications
Abs t rac t . A publicly verifiable secret sharing (PVSS) scheme, named by Stadler in [Sta96], is a special VSS scheme in which anyone, not only the shareholders, can verify that the secret shares are correctly distributed. The property of public verifiability is what the first proposed VSS scheme [CGMA85] incorporated but later protocols [GMW87, Fe187, Ped911 failed to include. PVSS can provid...
متن کاملPublicly Verifiable Ciphertexts
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can ...
متن کاملHybrid Publicly Verifiable Computation
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations to more powerful servers, and to verify the correctness of results. Delegation and verification rely only on public parameters, and thus PVC lends itself to large multi-user systems where entities need not be registered. In such settings, individual user requirements may be diverse and cannot be realis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-662-64331-0_28