Blockchains from non-idealized hash functions

Juan A. Garay, Aggelos Kiayias*, Giorgos Panagiotakos

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

The formalization of concrete, non-idealized hash function properties sufficient to prove the security of Bitcoin and related protocols has been elusive, as all previous security analyses of blockchain protocols have been performed in the random oracle model. In this paper we identify three such properties, and then construct a blockchain protocol whose security can be reduced to them in the standard model assuming a common reference string (CRS). The three properties are: collision resistance, computational randomness extraction and iterated hardness. While the first two properties have been extensively studied, iterated hardness has been empirically stress-tested since the rise of Bitcoin; in fact, as we demonstrate in this paper, any attack against it (assuming the other two properties hold) results in an attack against Bitcoin. In addition, iterated hardness puts forth a new class of search problems which we term iterated search problems (ISP). ISPs enable the concise and modular specification of blockchain protocols, and may be of independent interest.
Original languageEnglish
Title of host publicationTheory of Cryptography
Subtitle of host publication18th International Conference
EditorsRafael Pass, Krzysztof Pietrzak
PublisherSpringer
Pages291-321
Number of pages31
Volume12550
ISBN (Print)9783030643744
DOIs
Publication statusPublished - 9 Dec 2020
Event18th International Conference on Theory of Cryptography - Durham, United States
Duration: 16 Nov 202019 Nov 2020

Publication series

NameLecture Notes in Computer Science
Volume12550
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Conference on Theory of Cryptography
Abbreviated titleTCCC 2020
Country/TerritoryUnited States
CityDurham
Period16/11/2019/11/20

Keywords / Materials (for Non-textual outputs)

  • blockchain protocols
  • proof-of-work
  • falsifiable assumptions
  • non-idealized hash functions

Fingerprint

Dive into the research topics of 'Blockchains from non-idealized hash functions'. Together they form a unique fingerprint.

Cite this