2 research outputs found
DECO: Liberating Web Data Using Decentralized Oracles for TLS
Thanks to the widespread deployment of TLS, users can access private data
over channels with end-to-end confidentiality and integrity. What they cannot
do, however, is prove to third parties the {\em provenance} of such data, i.e.,
that it genuinely came from a particular website. Existing approaches either
introduce undesirable trust assumptions or require server-side modifications.
As a result, the value of users' private data is locked up in its point of
origin. Users cannot export their data with preserved integrity to other
applications without help and permission from the current data holder.
We propose DECO (short for \underline{dec}entralized \underline{o}racle) to
address the above problems. DECO allows users to prove that a piece of data
accessed via TLS came from a particular website and optionally prove statements
about such data in zero-knowledge, keeping the data itself secret. DECO is the
first such system that works without trusted hardware or server-side
modifications.
DECO can liberate data from centralized web-service silos, making it
accessible to a rich spectrum of applications. To demonstrate the power of
DECO, we implement three applications that are hard to achieve without it: a
private financial instrument using smart contracts, converting legacy
credentials to anonymous credentials, and verifiable claims against price
discrimination.Comment: This is the extended version of the CCS'20 pape
CHURP: Dynamic-Committee Proactive Secret Sharing
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure secret-sharing in dynamic settings, where the committee of nodes storing a secret changes over time. Designed for blockchains, CHURP has lower communication complexity than previous schemes: on-chain and off-chain in the optimistic case of no node failures.
CHURP includes several technical innovations: An efficient new proactivization scheme of independent interest, a technique (using asymmetric bivariate polynomials) for efficiently changing secret-sharing thresholds, and a hedge against setup failures in an efficient polynomial commitment scheme. We also introduce a general new technique for inexpensive off-chain communication across the peer-to-peer networks of permissionless blockchains.
We formally prove the security of CHURP, report on an implementation, and present performance measurements