Post-Quantum Single Secret Leader Election (SSLE) from Publicly Re-Randomizable Commitments

D Boneh, A Partap, L Rotem - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Cryptology ePrint Archive, 2023eprint.iacr.org
Abstract A Single Secret Leader Election (SSLE) enables a group of parties to randomly
choose exactly one leader from the group with the restriction that the identity of the leader
will be known to the chosen leader and nobody else. At a later time, the elected leader
should be able to publicly reveal her identity and prove that she is the elected leader. The
election process itself should work properly even if many registered users are passive and
do not send any messages. SSLE is used to strengthen the security of proof-of-stake …
Abstract
A Single Secret Leader Election (SSLE) enables a group of parties to randomly choose exactly one leader from the group with the restriction that the identity of the leader will be known to the chosen leader and nobody else. At a later time, the elected leader should be able to publicly reveal her identity and prove that she is the elected leader. The election process itself should work properly even if many registered users are passive and do not send any messages. SSLE is used to strengthen the security of proof-of-stake consensus protocols by ensuring that the identity of the block proposer remains unknown until the proposer publishes a block. Boneh, Eskandarian, Hanzlik, and Greco (AFT'20) defined the concept of an SSLE and gave several constructions. Their most efficient construction is based on the difficulty of the Decision Diffie-Hellman problem in a cyclic group. In this work we construct the first efficient SSLE protocols based on the standard Learning With Errors (LWE) problem on integer lattices, as well as the Ring-LWE problem. Both are believed to be post-quantum secure. Our constructions generalize the paradigm of Boneh et al. by introducing the concept of a re-randomizable commitment (RRC). We then construct several post-quantum RRC schemes from lattice assumptions and prove the security of the derived SSLE protocols. Constructing a lattice-based RRC scheme is non-trivial, and may be of independent interest.
eprint.iacr.org
以上显示的是最相近的搜索结果。 查看全部搜索结果