skip to main content
10.1145/2660267.2660380acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

How to Use Bitcoin to Incentivize Correct Computations

Published: 03 November 2014 Publication History

Abstract

We study a model of incentivizing correct computations in a variety of cryptographic tasks. For each of these tasks we propose a formal model and design protocols satisfying our model's constraints in a hybrid model where parties have access to special ideal functionalities that enable monetary transactions. We summarize our results:
Verifiable computation. We consider a setting where a delegator outsources computation to a worker who expects to get paid in return for delivering correct outputs. We design protocols that compile both public and private verification schemes to support incentivizations described above.
Secure computation with restricted leakage. Building on the recent work of Huang et al. (Security and Privacy 2012), we show an efficient secure computation protocol that monetarily penalizes an adversary that attempts to learn one bit of information but gets detected in the process.
Fair secure computation. Inspired by recent work, we consider a model of secure computation where a party that aborts after learning the output is monetarily penalized. We then propose an ideal transaction functionality FML and show a constant-round realization on the Bitcoin network. Then, in the FML-hybrid world we design a constant round protocol for secure computation in this model.
Noninteractive bounties. We provide formal definitions and candidate realizations of noninteractive bounty mechanisms on the Bitcoin network which (1) allow a bounty maker to place a bounty for the solution of a hard problem by sending a single message, and (2) allow a bounty collector (unknown at the time of bounty creation) with the solution to claim the bounty, while (3) ensuring that the bounty maker can learn the solution whenever its bounty is collected, and (4) preventing malicious eavesdropping parties from both claiming the bounty as well as learning the solution.
All our protocol realizations (except those realizing fair secure computation) rely on a special ideal functionality that is not currently supported in Bitcoin due to limitations imposed on Bitcoin scripts. Motivated by this, we propose validation complexity of a protocol, a formal complexity measure that captures the amount of computational effort required to validate Bitcoin transactions required to implement it in Bitcoin. Our protocols are also designed to take advantage of optimistic scenarios where participating parties behave honestly.

References

[1]
Bitcoin wiki: CVEs. https://en.bitcoin.it/wiki/CVEs#CVE-2010--5141.
[2]
G. Andresen. Turing complete language vs non-turing complete. https://bitcointalk.org/index.php?topic=431513.20#msg4882293.
[3]
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek. Fair two-party computations via the bitcoin deposits. In First Workshop on Bitcoin Research, FC, 2014.
[4]
M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek. Secure multiparty computations on bitcoin. In IEEE Security and Privacy, 2014.
[5]
Gilad Asharov, Yehuda Lindell, and Hila Zarosim. Fair and efficient secure multiparty computation with reputation systems. In Asiacrypt (2), pages 201--220, 2013.
[6]
Gilad Asharov and Claudio Orlandi. Calling out cheaters: Covert security with public verifiability. In Asiacrypt, pages 681--698, 2012.
[7]
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. In Eurocrypt, 1998.
[8]
Yonatan Aumann and Yehuda Lindell. Security against covert adversaries: Efficient protocols for realistic adversaries. In Salil P. Vadhan, editor, 4th Theory of Cryptography Conference -- TCC 2007, volume 4392 of LNCS, pages 137--156. Springer, February 2007.
[9]
S. Barber, X. Boyen, E. Shi, and E. Uzun. Bitter to better - how to make bitcoin a better currency. In FC, 2012.
[10]
Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Kupcu, and Anna Lysyanskaya. Incentivizing outsourced computation. In NetEcon, pages85--90, 2008.
[11]
Iddo Bentov and Ranjit Kumaresan. How to use bitcoin to design fair protocols. In ePrint 2014/129, 2014.
[12]
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In Crypto (1), 2013.
[13]
J.-S. Coron, T. Lepoint, and M. Tibouchi. Practical multlinear maps over the integers. In Crypto (1), 2013.
[14]
E. Friedman and P. Resnick. The social cost of cheap pseudonyms. In Journal of Economics and Management Strategy, pages 173--199, 2000.
[15]
S. Garg, C. Gentry, S. Halevi, and D. Wichs. On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. In ePrint 2013/860.
[16]
S. Garg, C. Gentry, A. Sahai, and B. Waters. Witness encryption and its applications. In STOC, 2013.
[17]
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Advances in Cryptology -- Crypto 2010, 2010.
[18]
R. Gennaro, C. Gentry, B. Parno, and M. Raykova. Quadratic span programs and succinct nizks without pcps. In Eurocrypt, 2013.
[19]
Oded Goldreich. Foundations of cryptography - vol. 2. 2004.
[20]
S. Goldwasser, Y. -- T. Kalai, R.Ã. Popa, V. Vaikuntanathan, and N. Zeldovich. How to run turing machines on encrypted data. In Crypto (2), pages 536--553, 2013.
[21]
Philippe Golle and Ilya Mironov. Uncheatable distributed computations. In David Naccache, editor, Cryptographers? Track -- RSA 2001, volume 2020 of LNCS, pages 425--440. Springer, April 2001.
[22]
V. Goyal, P. Mohassel, and A. Smith. Efficient two party and multi party computation against covert adversaries. In Advances in Cryptology -- Eurocrypt 2008.
[23]
Y. Huang, J. Katz, and D. Evans. Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In IEEE Security and Privacy, pages 272--284, 2012.
[24]
Y. Ishai, M. Prabhakaran, and A. Sahai. Founding cryptography on oblivious transfer - efficiently. In Advances in Cryptology -- Crypto 2008, pages 572--591, 2008.
[25]
S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner. Outsourced symmetric private information retrieval. In CCS, pages 875--888.
[26]
L. Lamport. Fast paxos, 2005. MSR-TR-2005--112.
[27]
Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. Journal of Cryptology., 22(2):161--188, 2009.
[28]
G. Maxwell. Zero knowledge contingent payment. 2011. https://en.bitcoin.it/wiki/Zero_Knowledge_Contingent_Payment.
[29]
P. Mohassel and M. Franklin. Efficiency tradeoffs for malicious two-party computation. In PKC 2006.
[30]
V. Pappas, B. Vo, F. Krell, S.-G. Choi, V. Kolesnikov, S. Bellovin, A. Keromytis, and T. Malkin. Blind seer: A scalable private dbms. In IEEE Security and Privacy, 2014.
[31]
B. Parno, J. Howell, C. Gentry, and M. Raykova. Pinocchio: Nearly practical verifiable computation. In IEEE S&P, 2013.
[32]
R. L. Rivest, A. Shamir, and D. A. Wagner. Time-lock puzzles and timed-release crypto. Technical Report MIT/LCS/TR-684, MIT, 1996.
[33]
A. Rosen and A. Shelat. Optimistic concurrent zero knowledge. In Advances in Cryptology -- Asiacrypt 2010.
[34]
P. Todd. Reward offered for hash collisions for sha1, sha256, ripemd160. https://bitcointalk.org/index.php?topic=293382.0, 2013.
[35]
Andrew Yao. How to generate and exchange secrets (extended abstract). In FOCS, pages 162--167, 1986.

Cited By

View all
  • (2025)EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model BlockchainsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.341861722:1(771-786)Online publication date: Jan-2025
  • (2024)Confidential Distributed Ledgers for Online Syndicated LendingIEEE Transactions on Services Computing10.1109/TSC.2024.3440012(1-14)Online publication date: 2024
  • (2024)T-Watch: Towards Timed Execution of Private Transaction in BlockchainsIEEE Transactions on Services Computing10.1109/TSC.2024.340216317:3(1279-1292)Online publication date: May-2024
  • Show More Cited By

Index Terms

  1. How to Use Bitcoin to Incentivize Correct Computations

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
    November 2014
    1592 pages
    ISBN:9781450329576
    DOI:10.1145/2660267
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bitcoin
    2. bounties
    3. fair exchange
    4. secure computation
    5. verifiable computation

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS'14
    Sponsor:

    Acceptance Rates

    CCS '14 Paper Acceptance Rate 114 of 585 submissions, 19%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)30
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model BlockchainsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.341861722:1(771-786)Online publication date: Jan-2025
    • (2024)Confidential Distributed Ledgers for Online Syndicated LendingIEEE Transactions on Services Computing10.1109/TSC.2024.3440012(1-14)Online publication date: 2024
    • (2024)T-Watch: Towards Timed Execution of Private Transaction in BlockchainsIEEE Transactions on Services Computing10.1109/TSC.2024.340216317:3(1279-1292)Online publication date: May-2024
    • (2024)Empowering Scalable and Trustworthy Decentralized Computing through Meritocratic Economic Incentives2024 4th Intelligent Cybersecurity Conference (ICSC)10.1109/ICSC63108.2024.10895185(58-64)Online publication date: 17-Sep-2024
    • (2024)An efficient polynomial-based verifiable computation scheme on multi-source outsourced dataScientific Reports10.1038/s41598-024-53267-x14:1Online publication date: 12-Apr-2024
    • (2024)Bitcoin as a Transaction Ledger: A Composable TreatmentJournal of Cryptology10.1007/s00145-024-09493-737:2Online publication date: 4-Apr-2024
    • (2024)FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater DetectionInformation and Communications Security10.1007/978-981-97-8801-9_4(63-83)Online publication date: 27-Aug-2024
    • (2024)Fair Private Set Intersection Using Smart ContractsApplied Cryptography and Network Security10.1007/978-3-031-54776-8_4(74-104)Online publication date: 29-Feb-2024
    • (2023)A Decentralized Information Marketplace Preserving Input and Output PrivacyProceedings of the Second ACM Data Economy Workshop10.1145/3600046.3600047(1-6)Online publication date: 18-Jun-2023
    • (2023)Trusted Searchable Cryptographic Authentication Model in Edge Computing2023 International Conference on Blockchain Technology and Information Security (ICBCTIS)10.1109/ICBCTIS59921.2023.00031(152-158)Online publication date: Jun-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media