Fractional Spending: VRF&Ring Signatures As Efficient Primitives For Secret Quorums
- URL: http://arxiv.org/abs/2412.16648v1
- Date: Sat, 21 Dec 2024 14:37:36 GMT
- Title: Fractional Spending: VRF&Ring Signatures As Efficient Primitives For Secret Quorums
- Authors: Maxence Perion, Sara Tucci-Piergiovanni, Rida Bazzi,
- Abstract summary: Digital currencies face challenges in distributed settings, particularly regarding double spending.<n>Traditional approaches, such as Bitcoin, use consensus to establish a total order of transactions.<n>This paper enhances such solution by integrating different cryptographic primitives, VRF and Ring Signatures, into a similar protocol.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Digital currencies have emerged as a significant evolution in the financial system, yet they face challenges in distributed settings, particularly regarding double spending. Traditional approaches, such as Bitcoin, use consensus to establish a total order of transactions, ensuring that no more than the currency held by an account is spent in the order. However, consensus protocols are costly, especially when coping with Byzantine faults. It was shown that solving Consensus is not needed to perform currency's transfer, for instance using byzantine quorum systems but validation remains per-account sequential. Recent research also introduced the fractional spending problem, which enables concurrent but non-conflicting transactions i.e., transactions that spend from the same account but cannot lead to a double spending because each is only spending a small fraction of the balance. A solution was proposed based on a new quorum system and specific cryptographic primitives to protect against an adaptive adversary. The quorum system, called (k1, k2)-quorum system, guarantees that at least k1 transactions can be validated concurrently but that no more than k2 can. Employing such quorums, a payer can validate concurrently multiple fractional spending transactions in parallel with high probability. Subsequently, the payer reclaims any remaining sum through a settlement. This paper enhances such solution by integrating different cryptographic primitives, VRF and Ring Signatures, into a similar protocol. But contrarily, these tools ensure quorums to remain secret during settlements, allowing to reduces its communication costs from cubic to quadratic in messages. We also achieve payment transaction with 3 message delays rather then 5. Additionally, we propose a refined formalization of the fractional spending problem, introducing coupons, which simplifies the theoretical framework and proof structure.
Related papers
- Information Bargaining: Bilateral Commitment in Bayesian Persuasion [60.3761154043329]
We introduce a unified framework and a well-structured solution concept for long-term persuasion.<n>This perspective makes explicit the common knowledge of the game structure and grants the receiver comparable commitment capabilities.<n>The framework is validated through a two-stage validation-and-inference paradigm.
arXiv Detail & Related papers (2025-06-06T08:42:34Z) - CoBRA: A Universal Strategyproof Confirmation Protocol for Quorum-based Proof-of-Stake Blockchains [1.5761916307614148]
We present a formal analysis of quorum-based State Machine Replication (SMR) protocols in Proof-of-Stake (PoS) systems under a hybrid threat model comprising honest, Byzantine, and rational validators.
Our analysis of traditional quorum-based protocols establishes two fundamental impossibility results: (1) in partially synchronous networks, no quorum-based protocol can achieve SMR when rational and Byzantine validators comprise more than $1/3$ of participants, and (2) in synchronous networks, SMR remains impossible when rational and Byzantine validators comprise $2/3$ or more of participants.
arXiv Detail & Related papers (2025-03-21T01:39:29Z) - Multi-Channel Currency: A Secure Method Using Semi-Quantum Tokens [8.704202214245203]
We propose a quantum-state-based currency system that uses the non-cloning theorem to enable secure, multi-channel transactions.
We demonstrate this system's implementation with experimental results, including use cases for currency transfers and swaps.
arXiv Detail & Related papers (2025-02-25T17:21:46Z) - Towards a Sharp Analysis of Offline Policy Learning for $f$-Divergence-Regularized Contextual Bandits [49.96531901205305]
We analyze $f$-divergence-regularized offline policy learning.<n>For reverse Kullback-Leibler (KL) divergence, we give the first $tildeO(epsilon-1)$ sample complexity under single-policy concentrability.<n>We extend our analysis to dueling bandits, and we believe these results take a significant step toward a comprehensive understanding of $f$-divergence-regularized policy learning.
arXiv Detail & Related papers (2025-02-09T22:14:45Z) - Cloning Games, Black Holes and Cryptography [50.022147589030304]
We introduce a new toolkit for analyzing cloning games.<n>This framework allows us to analyze a new cloning game based on binary phase states.<n>We show that the binary phase variantally optimal bound offers quantitative insights into information scrambling in idealized models of black holes.
arXiv Detail & Related papers (2024-11-07T14:09:32Z) - A distributed and parallel $(k, n)$ QSS scheme with verification capability [0.0]
This article introduces a novel Quantum Secret Sharing scheme with $( k, n )$ threshold and endowed with verification capability.
The primary novelty of the new protocol lies in its ability to operate completely parallelly in a fully distributed setup.
arXiv Detail & Related papers (2024-10-24T11:12:38Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.<n>Our measurements from the Aptos mainnet show that the optimistic approach reduces latency overhead by 71%.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Certified Robustness against Sparse Adversarial Perturbations via Data Localization [39.883465335244594]
We show that a simple classifier emerges from our theory, dubbed Box-NN, which naturally incorporates the geometry of the problem and improves upon the current state-of-the-art in certified robustness against sparse attacks for the MNIST and Fashion-MNIST datasets.
arXiv Detail & Related papers (2024-05-23T05:02:00Z) - Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited [3.8014967401609208]
We present the first information-theoretic multi-valued OCC protocol in the asynchronous setting with optimal resiliency.
Our protocol efficiently implements with an exponential-size domain.
We also provide proof in Canetti's Universal Composability framework.
arXiv Detail & Related papers (2023-12-22T08:10:11Z) - Sui Lutris: A Blockchain Combining Broadcast and Consensus [6.922934367879061]
Sui Lutris is the first smart-contract platform to achieve sub-second finality.
We develop a novel reconfiguration protocol, the first to provably show the safe reconfiguration of a consensusless blockchain.
arXiv Detail & Related papers (2023-10-27T10:40:11Z) - Towards a Theory of Maximal Extractable Value II: Uncertainty [4.07926531936425]
Maximal Extractable Value (MEV) is value extractable by temporary monopoly power commonly found in decentralized systems.
This extraction stems from a lack of user privacy upon transaction submission and the ability of a monopolist validator to reorder, add, and/or censor transactions.
We show that neither fair ordering techniques nor economic mechanisms can individually mitigate MEV for arbitrary payoff functions.
arXiv Detail & Related papers (2023-09-25T15:01:11Z) - Topology-Agnostic Detection of Temporal Money Laundering Flows in
Billion-Scale Transactions [0.03626013617212666]
We propose a framework to efficiently construct a temporal graph of sequential transactions.
We evaluate the scalability and the effectiveness of our framework against two state-of-the-art solutions for detecting suspicious flows of transactions.
arXiv Detail & Related papers (2023-09-24T15:11:58Z) - Exponential Qubit Reduction in Optimization for Financial Transaction Settlement [0.0]
We extend the qubit-efficient encoding presented in [Tan et al., Quantum 5, 454 (2021) and apply it to instances of the financial transaction settlement problem constructed from data provided by a regulated financial exchange.
arXiv Detail & Related papers (2023-07-14T06:58:43Z) - Risk-limiting Financial Audits via Weighted Sampling without Replacement [47.189919138260066]
Given $N$ transactions, the goal is to estimate the total misstated monetary fraction to a given accuracy.
We do this by constructing new confidence sequences for the weighted average of $N$ unknown values.
We show that when the side information is sufficiently predictive, it can directly drive the sampling.
arXiv Detail & Related papers (2023-05-08T17:34:06Z) - Universal qudit gate synthesis for transmons [44.22241766275732]
We design a superconducting qudit-based quantum processor.
We propose a universal gate set featuring a two-qudit cross-resonance entangling gate.
We numerically demonstrate the synthesis of $rm SU(16)$ gates for noisy quantum hardware.
arXiv Detail & Related papers (2022-12-08T18:59:53Z) - Quantization for decentralized learning under subspace constraints [61.59416703323886]
We consider decentralized optimization problems where agents have individual cost functions to minimize subject to subspace constraints.
We propose and study an adaptive decentralized strategy where the agents employ differential randomized quantizers to compress their estimates.
The analysis shows that, under some general conditions on the quantization noise, the strategy is stable both in terms of mean-square error and average bit rate.
arXiv Detail & Related papers (2022-09-16T09:38:38Z) - Software mitigation of coherent two-qubit gate errors [55.878249096379804]
Two-qubit gates are important components of quantum computing.
But unwanted interactions between qubits (so-called parasitic gates) can degrade the performance of quantum applications.
We present two software methods to mitigate parasitic two-qubit gate errors.
arXiv Detail & Related papers (2021-11-08T17:37:27Z) - Acceleration in Distributed Optimization Under Similarity [72.54787082152278]
We study distributed (strongly convex) optimization problems over a network of agents, with no centralized nodes.
An $varepsilon$-solution is achieved in $tildemathcalrhoObig(sqrtfracbeta/mu (1-)log1/varepsilonbig)$ number of communications steps.
This rate matches (up to poly-log factors) for the first time lower complexity communication bounds of distributed gossip-algorithms applied to the class of problems of interest.
arXiv Detail & Related papers (2021-10-24T04:03:00Z) - Permutation Compressors for Provably Faster Distributed Nonconvex
Optimization [68.8204255655161]
We show that the MARINA method of Gorbunov et al (2021) can be considered as a state-of-the-art method in terms of theoretical communication complexity.
Theory of MARINA to support the theory of potentially em correlated compressors, extends to the method beyond the classical independent compressors setting.
arXiv Detail & Related papers (2021-10-07T09:38:15Z) - Certifiably Robust Interpretation via Renyi Differential Privacy [77.04377192920741]
We study the problem of interpretation robustness from a new perspective of Renyi differential privacy (RDP)
First, it can offer provable and certifiable top-$k$ robustness.
Second, our proposed method offers $sim10%$ better experimental robustness than existing approaches.
Third, our method can provide a smooth tradeoff between robustness and computational efficiency.
arXiv Detail & Related papers (2021-07-04T06:58:01Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z) - Universal Communication Efficient Quantum Threshold Secret Sharing
Schemes [3.8073142980733]
We propose a more general class of $((k,n))$ quantum secret sharing schemes with low communication complexity.
Our schemes are universal in the sense that the combiner can contact any number of parties to recover the secret with communication efficiency.
arXiv Detail & Related papers (2020-02-21T11:14:40Z) - Quantum secret sharing using GHZ state qubit positioning and selective
qubits strategy for secret reconstruction [4.378411442784295]
The work presents a novel quantum secret sharing strategy based on GHZ product state sharing between three parties.
Unlike the other protocols, this protocol does not involve the entire initial state reconstruction, rather uses selective qubits to discard the redundant qubits at the time of reconstruction to decrypt the secret.
The protocol also allows for security against malicious attacks by an adversary without affecting the integrity of the secret.
arXiv Detail & Related papers (2020-02-21T08:45:07Z) - Public Bayesian Persuasion: Being Almost Optimal and Almost Persuasive [57.47546090379434]
We study the public persuasion problem in the general setting with: (i) arbitrary state spaces; (ii) arbitrary action spaces; (iii) arbitrary sender's utility functions.
We provide a quasi-polynomial time bi-criteria approximation algorithm for arbitrary public persuasion problems that, in specific settings, yields a QPTAS.
arXiv Detail & Related papers (2020-02-12T18:59:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.