Mining for privacy: How to bootstrap a snarky blockchain

T Kerber, A Kiayias, M Kohlweiss - … , FC 2021, Virtual Event, March 1–5 …, 2021 - Springer
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021Springer
Non-interactive zero-knowledge proofs, and more specifically succinct non-interactive zero-
knowledge arguments (zk-SNARKs), have been proven to be the “Swiss army knife” of the
blockchain and distributed ledger space, with a variety of applications in privacy,
interoperability and scalability. Many commonly used SNARK systems rely on a structured
reference string, the secure generation of which turns out to be their Achilles heel: If the
randomness used for the generation is known, the soundness of the proof system can be …
Abstract
Non-interactive zero-knowledge proofs, and more specifically succinct non-interactive zero-knowledge arguments (zk-SNARKs), have been proven to be the “Swiss army knife” of the blockchain and distributed ledger space, with a variety of applications in privacy, interoperability and scalability. Many commonly used SNARK systems rely on a structured reference string, the secure generation of which turns out to be their Achilles heel: If the randomness used for the generation is known, the soundness of the proof system can be broken with devastating consequences for the underlying blockchain system that utilises them. In this work we describe and analyse, for the first time, a blockchain mechanism that produces a secure SRS with the characteristic that security is shown under comparable conditions to the blockchain protocol itself. Our mechanism makes use of the recent discovery of updateable structured reference strings to perform this secure generation in a fully distributed manner. In this way, the SRS emanates from the normal operation of the blockchain protocol itself without the need of additional security assumptions or off-chain computation and/or verification. We provide concrete guidelines for the parameterisation of this setup which allows for the completion of a secure setup in a reasonable period of time. We also provide an incentive scheme that, when paired with the update mechanism, properly incentivises participants into contributing to secure reference string generation.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果