Abstract
The emergence of distributed digital currencies has raised the need for a reliable consensus mechanism. In proof-of-stake cryptocurrencies, the participants periodically choose a closed set of validators, who can vote and append transactions to the blockchain. Each validator can become a leader with the probability proportional to its stake. Keeping the leader private yet unique until it publishes a new block can significantly reduce the attack vector of an adversary and improve the throughput of the network. The problem of Single Secret Leader Election (SSLE) was first formally defined by Boneh et al. in 2020.
In this work, we propose a novel framework for constructing SSLE protocols, which relies on secure multi-party computation (MPC) and satisfies the desired security properties. Our framework does not use any shuffle or sort operations and has a computational cost for N parties as low as O(N) of basic MPC operations per party. We improve the state-of-the-art for SSLE protocols that do not assume a trusted setup. Moreover, our SSLE scheme efficiently handles weighted elections. That is, for a total weight S of N parties, the associated costs are only increased by a factor of logS . When the MPC layer is instantiated with techniques based on Shamir’s secret-sharing, our SSLE has a communication cost of O(N2) which is spread over O(logN) rounds, can tolerate up to t
In this work, we propose a novel framework for constructing SSLE protocols, which relies on secure multi-party computation (MPC) and satisfies the desired security properties. Our framework does not use any shuffle or sort operations and has a computational cost for N parties as low as O(N) of basic MPC operations per party. We improve the state-of-the-art for SSLE protocols that do not assume a trusted setup. Moreover, our SSLE scheme efficiently handles weighted elections. That is, for a total weight S of N parties, the associated costs are only increased by a factor of logS . When the MPC layer is instantiated with techniques based on Shamir’s secret-sharing, our SSLE has a communication cost of O(N2) which is spread over O(logN) rounds, can tolerate up to t
Original language | English |
---|---|
Title of host publication | Computer Security – ESORICS 2023 |
Subtitle of host publication | 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26–30, 2022, Proceedings, Part II |
Editors | Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng |
Place of Publication | Cham |
Publisher | Springer |
Pages | 672–691 |
Number of pages | 20 |
Edition | 1 |
ISBN (Electronic) | 9783031171468 |
ISBN (Print) | 9783031171451 |
DOIs | |
Publication status | Published - 23 Sept 2022 |
Event | 27th European Symposium on Research in Computer Security - Copenhagen, Denmark Duration: 26 Sept 2022 → 30 Sept 2022 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 13555 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 27th European Symposium on Research in Computer Security |
---|---|
Abbreviated title | ESORICS 2022 |
Country/Territory | Denmark |
City | Copenhagen |
Period | 26/09/22 → 30/09/22 |