3 research outputs found

    An Incentive-Compatible Smart Contract for Decentralized Commerce

    Full text link
    We propose a smart contract that allows two mutually distrusting parties to transact any non-digital good or service by deploying a smart contract on a blockchain to act as escrow. The contract settles disputes by letting parties wager that they can convince an arbiter that they were the honest party. We analyse the contract as an extensive-form game and prove that the honest strategy is secure in a strong game-theoretic sense if and only if the arbiter is biased in favor of honest parties. By relaxing the security notion, we can replace the arbiter by a random coin toss. Finally, we show how to generalize the contract to multiparty transactions in a way that amortizes the transaction fees.Comment: 14 pages, 3 figure

    More Communication Lower Bounds for Information-Theoretic MPC

    Get PDF
    We prove two classes of lower bounds on the communication complexity of information-theoretically secure multiparty computation. The first lower bound applies to perfect passive secure multiparty computation in the standard model with n = 2t+1 parties of which t are corrupted. We show a lower bound that applies to secure evaluation of any function, assuming that each party can choose to learn or not learn the output. Specifically, we show that there is a function H^* such that for any protocol that evaluates y_i = b_i ? f(x?,...,x_n) with perfect passive security (where b_i is a private boolean input), the total communication must be at least 1/2 ?_{i = 1}? H_f^*(x_i) bits of information. The second lower bound applies to the perfect maliciously secure setting with n = 3t+1 parties. We show that for any n and all large enough S, there exists a reactive functionality F_S taking an S-bit string as input (and with short output) such that any protocol implementing F_S with perfect malicious security must communicate ?(nS) bits. Since the functionalities we study can be implemented with linear size circuits, the result can equivalently be stated as follows: for any n and all large enough g ? ? there exists a reactive functionality F_C doing computation specified by a Boolean circuit C with g gates, where any perfectly secure protocol implementing F_C must communicate ?(n g) bits. The results easily extends to constructing similar functionalities defined over any fixed finite field. Using known techniques, we also show an upper bound that matches the lower bound up to a constant factor (existing upper bounds are a factor lg n off for Boolean circuits). Both results also extend to the case where the threshold t is suboptimal. Namely if n = kt+s the bound is weakened by a factor O(s), which corresponds to known optimizations via packed secret-sharing

    The Planted kk-SUM Problem: Algorithms, Lower Bounds, Hardness Amplification, and Cryptography

    Get PDF
    In the average-case kk-SUM problem, given rr integers chosen uniformly at random from {0,…,Mβˆ’1}\{0,\ldots,M-1\}, the objective is to find a set of kk numbers that sum to 0 modulo MM (this set is called a solution ). In the related kk-XOR problem, given kk uniformly random Boolean vectors of length log MM, the objective is to find a set of kk of them whose bitwise-XOR is the all-zero vector. Both of these problems have widespread applications in the study of fine-grained complexity and cryptanalysis. The feasibility and complexity of these problems depends on the relative values of kk, rr, and MM. The dense regime of M≀rkM \leq r^k, where solutions exist with high probability, is quite well-understood and we have several non-trivial algorithms and hardness conjectures here. Much less is known about the sparse regime of M≫rkM\gg r^k, where solutions are unlikely to exist. The best answers we have for many fundamental questions here are limited to whatever carries over from the dense or worst-case settings. We study the planted kk-SUM and kk-XOR problems in the sparse regime. In these problems, a random solution is planted in a randomly generated instance and has to be recovered. As MM increases past rkr^k, these planted solutions tend to be the only solutions with increasing probability, potentially becoming easier to find. We show several results about the complexity and applications of these problems. Conditional Lower Bounds. Assuming established conjectures about the hardness of average-case (non-planted) kk-SUM when M=rkM = r^k, we show non-trivial lower bounds on the running time of algorithms for planted kk-SUM when rk≀M≀r2kr^k\leq M\leq r^{2k}. We show the same for kk-XOR as well. Search-to-Decision Reduction. For any M>rkM>r^k, suppose there is an algorithm running in time TT that can distinguish between a random kk-SUM instance and a random instance with a planted solution, with success probability (1βˆ’o(1))(1-o(1)). Then, for the same MM, there is an algorithm running in time O~(T)\tilde{O}(T) that solves planted kk-SUM with constant probability. The same holds for kk-XOR as well. Hardness Amplification. For any Mβ‰₯rkM \geq r^k, if an algorithm running in time TT solves planted kk-XOR with success probability Ξ©(1/polylog(r))\Omega(1/\text{polylog}(r)), then there is an algorithm running in time O~(T)\tilde O(T) that solves it with probability (1βˆ’o(1))(1-o(1)). We show this by constructing a rapidly mixing random walk over kk-XOR instances that preserves the planted solution. Cryptography. For some M≀2polylog(r)M \leq 2^{\text{polylog}(r)}, the hardness of the kk-XOR problem can be used to construct Public-Key Encryption (PKE) assuming that the Learning Parity with Noise (LPN) problem with constant noise rate is hard for 2n0.012^{n^{0.01}}-time algorithms. Previous constructions of PKE from LPN needed either a noise rate of O(1/n)O(1/\sqrt{n}), or hardness for 2n0.52^{n^{0.5}}-time algorithms. Algorithms. For any Mβ‰₯2r2M \geq 2^{r^2}, there is a constant cc (independent of kk) and an algorithm running in time rcr^c that, for any kk, solves planted kk-SUM with success probability Ξ©(1/8k)\Omega(1/8^k). We get this by showing an average-case reduction from planted kk-SUM to the Subset Sum problem. For rk≀Mβ‰ͺ2r2r^k \leq M \ll 2^{r^2}, the best known algorithms are still the worst-case kk-SUM algorithms running in time r⌈k/2βŒ‰βˆ’o(1)r^{\lceil{k/2}\rceil-o(1)}
    corecore