[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2023/1887

GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity

Renas Bacho, CISPA Helmholtz Center for Information Security, Saarland University
Christoph Lenzen, CISPA Helmholtz Center for Information Security
Julian Loss, CISPA Helmholtz Center for Information Security
Simon Ochsenreither, Vector Informatik GmbH
Dimitrios Papachristoudis
Abstract

A randomness beacon is a source of continuous and publicly verifiable randomness which is of crucial importance for many applications. Existing works on randomness beacons suffer from at least one of the following drawbacks: (i) security only against static (i.e., non-adaptive) adversaries, (ii) each epoch takes many rounds of communication, or (iii) computationally expensive tools such as proof-of-work (PoW) or verifiable delay functions (VDF). In this work, we introduce GRandLine, the first adaptively secure randomness beacon protocol that overcomes all these limitations while preserving simplicity and optimal resilience in the synchronous network setting. We achieve our result in two steps. First, we design a novel distributed key generation (DKG) protocol GRand that runs in $\mathcal{O}(\lambda n^2\log{n})$ bits of communication but, unlike most conventional DKG protocols, outputs both secret and public keys as group elements. Here, $\lambda$ denotes the security parameter. Second, following termination of GRand, parties can use their keys to derive a sequence of randomness beacon values, where each random value costs only a single asynchronous round and $\mathcal{O}(\lambda n^2)$ bits of communication. We implement GRandLine and evaluate it using a network of up to 64 parties running in geographically distributed AWS instances. Our evaluation shows that GRandLine can produce about 2 beacon outputs per second in a network of 64 parties. We compare our protocol to the state-of-the-art randomness beacon protocols OptRand (NDSS '23), BRandPiper (CCS '21), and Drand, in the same setting and observe that it vastly outperforms them.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Major revision. ACM CCS 2024
DOI
10.1145/3658644.3690287
Keywords
Adaptive SecurityDistributed Key GenerationRandomness BeaconPVSSPairing-Based CryptographyTransparent Setup
Contact author(s)
renas bacho @ cispa de
lenzen @ cispa de
loss @ cispa de
s ochsenreither @ gmail com
dimpapach87 @ gmail com
History
2024-09-03: last of 5 revisions
2023-12-07: received
See all versions
Short URL
https://ia.cr/2023/1887
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1887,
      author = {Renas Bacho and Christoph Lenzen and Julian Loss and Simon Ochsenreither and Dimitrios Papachristoudis},
      title = {{GRandLine}: Adaptively Secure {DKG} and Randomness Beacon with (Log-)Quadratic Communication Complexity},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/1887},
      year = {2023},
      doi = {10.1145/3658644.3690287},
      url = {https://eprint.iacr.org/2023/1887}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.