Abstract
We introduce the concept of turn-based communication channel between two mutually distrustful parties with communication consistency, i.e. both parties have the same message history, and happens in sets of exchanged messages across a limited number of turns. Our construction leverages on timed primitives. Namely, we consider a \(\mathsf{\Delta }\)-delay hash function definition and use it to establish turns in the channel. Concretely, we introduce the one-way turn-based communication scheme and the two-way turn-based communication protocol and provide a concrete instantiation that achieves communication consistency.
A full version of this paper can be found at https://eprint.iacr.org/2021/1126.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alwen, J., Tackmann, B.: Moderately hard functions: definition, instantiations, and applications. In: TCC (2017). https://doi.org/10.1007/978-3-319-70500-2_17
Azar, P.D., Goldwasser, S., Park, S.: How to incentivize data-driven collaboration among competing parties. In: ITCS (2016). https://doi.org/10.1145/2840728.2840758
Baum, C., David, B., Dowsley, R., Nielsen, J.B., Oechsner, S.: TARDIS: time and relative delays in simulation. Technical Report 537 (2020)
Bentov, I., Gabizon, A., Mizrahi, A.: Cryptocurrencies without proof of work. In: FC (2016). https://doi.org/10.1007/978-3-662-53357-4_10
Bitansky, N., Goldwasser, S., Jain, A., Paneth, O., Vaikuntanathan, V., Waters, B.: Time-lock puzzles from randomized encodings. In: ITCS (2016). https://doi.org/10.1145/2840728.2840745
Boneh, D., Bonneau, J., Bünz, B., Fisch, B.: Verifiable delay functions. In: CRYPTO, vol. 10991 (2018). https://doi.org/10.1007/978-3-319-96884-1_25
Boneh, D., Bünz, B., Fisch, B.: Batching techniques for accumulators with applications to IOPs and stateless blockchains. In: CRYPTO (2019). https://doi.org/10.1007/978-3-030-26948-7_20
Boneh, D., Naor, M.: Timed commitments. In: CRYPTO (2000)
Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. J. ACM 51(6) (2004). https://doi.org/10.1145/1039488.1039489
Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. https://doi.org/10.1007/978-3-662-46803-6_10
Kalai, Y.T., Lindell, Y., Prabhakaran, M.: Concurrent composition of secure protocols in the timing model. J. Cryptol. 20(4), 431–492 (2007). https://doi.org/10.1007/s00145-007-0567-1
Katz, J., Lindell, Y.: Introduction to modern cryptography (2014)
Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Universally composable synchronous computation. In: TCC. https://doi.org/10.1007/978-3-642-36594-2_27
Katz, J., Miller, A., Shi, E.: Pseudonymous broadcast and secure computation from cryptographic puzzles. Cryptology ePrint Archive, Report 2014/857 (2014). https://eprint.iacr.org/2014/857
Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: CRYPTO, vol. 10401 (2017). https://doi.org/10.1007/978-3-319-63688-7_12
Lenstra, A.K., Wesolowski, B.: A random zoo: sloth, unicorn, and trx. Cryptology ePrint Archive, Report 2015/366 (2015). https://eprint.iacr.org/2015/366
Mahmoody, M., Moran, T., Vadhan, S.: Time-lock puzzles in the random oracle model. In: CRYPTO (2011). https://doi.org/10.1007/978-3-642-22792-9_3
Malavolta, G., Thyagarajan, S.A.K.: Homomorphic time-lock puzzles and applications. In: CRYPTO (2019). https://doi.org/10.1007/978-3-030-26948-7_22
Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical report, Massachusetts Institute of Technology (1996)
Scafuro, A., Siniscalchi, L., Visconti, I.: Publicly verifiable proofs from blockchains. In: PKC (2019). https://doi.org/10.1007/978-3-030-17253-4_13
Wesolowski, B.: Efficient verifiable delay functions. In: EUROCRYPT (2019). https://doi.org/10.1007/978-3-030-17659-4_13
Acknowledgements
This work was partially supported by the Swedish Research Council (Vetenskapsrådet) through the grant PRECIS (621-2014-4845), National Nature Science Foundation of China (No. 61972124), Zhejiang Provincial Natural Science Foundation of China (No. LY19F020019) and STINT grant (2017-7444).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Brunetta, C., Larangeira, M., Liang, B., Mitrokotsa, A., Tanaka, K. (2021). Turn-Based Communication Channels. In: Huang, Q., Yu, Y. (eds) Provable and Practical Security. ProvSec 2021. Lecture Notes in Computer Science(), vol 13059. Springer, Cham. https://doi.org/10.1007/978-3-030-90402-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-90402-9_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90401-2
Online ISBN: 978-3-030-90402-9
eBook Packages: Computer ScienceComputer Science (R0)