Skip to main content
Erschienen in: Cryptography and Communications 1/2018

03.11.2017

Malleability of the blockchain’s entropy

verfasst von: Cécile Pierrot, Benjamin Wesolowski

Erschienen in: Cryptography and Communications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trustworthy generation of public random numbers is necessary for the security of a number of cryptographic applications. It was suggested to use the inherent unpredictability of blockchains as a source of public randomness. Entropy from the Bitcoin blockchain in particular has been used in lotteries and has been suggested for a number of other applications ranging from smart contracts to election auditing. In this Arcticle, we analyse this idea and show how an adversary could manipulate these random numbers, even with limited computational power and financial budget.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
Note that https://static-content.springer.com/image/art%3A10.1007%2Fs12095-017-0264-3/MediaObjects/12095_2017_264_Figb_HTML.gif roughly equals US$ 4 260 at the time of writing this article, keeping in mind that the Bitcoin exchange rate still fluctuates a lot.
 
2
At the time of writing the last blocks are around number 400 000.
 
3
Note that keeping it secret is not critical in the strategy: the adversary could be completely public about this special fork, in the hope that some honest miners get confused and start unknowingly helping them (due to bad timing and propagation delays for instance).
 
4
For instance, if h = 3, a = 5and Δ = 6the word HAAAA HHA becomes HAAAA AAH that has 6 letters A and 5 − 6 + 3 = 2 letters H.
 
Literatur
1.
Zurück zum Zitat Bonneau, J., Clark, J., Goldfeder, S.: On bitcoin as a public randomness source. IACR Cryptology ePrint Archive, 2015:1015 (2015) Bonneau, J., Clark, J., Goldfeder, S.: On bitcoin as a public randomness source. IACR Cryptology ePrint Archive, 2015:1015 (2015)
3.
Zurück zum Zitat Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.. A., Felten, E.W. : Mixcoin: Anonymity for bitcoin with accountable mixes. In: Financial Cryptography and Data Security: 18th International Conference, FC 2014, pp 486–504. Springer, Berlin (2014) Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.. A., Felten, E.W. : Mixcoin: Anonymity for bitcoin with accountable mixes. In: Financial Cryptography and Data Security: 18th International Conference, FC 2014, pp 486–504. Springer, Berlin (2014)
4.
Zurück zum Zitat Bonneau, J.: Why buy when you can rent? - bribery attacks on bitcoin-style consensus. In: Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers, pp. 19–26 (2016) Bonneau, J.: Why buy when you can rent? - bribery attacks on bitcoin-style consensus. In: Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers, pp. 19–26 (2016)
5.
Zurück zum Zitat Buterin, V.: Could Ethereum do this better? [Tor Project is working on a web-wide random number generator] Reddit post. Accessed 25 Aug 2017 (2016) Buterin, V.: Could Ethereum do this better? [Tor Project is working on a web-wide random number generator] Reddit post. Accessed 25 Aug 2017 (2016)
6.
Zurück zum Zitat Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.T.: Scantegrity ii: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes. In: USENIX/ACCURATE Electronic Voting Technology Workshop (EVT) (2008) Chaum, D., Carback, R., Clark, J., Essex, A., Popoveniuc, S., Rivest, R.L., Ryan, P.Y.A., Shen, E., Sherman, A.T.: Scantegrity ii: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes. In: USENIX/ACCURATE Electronic Voting Technology Workshop (EVT) (2008)
7.
Zurück zum Zitat Clark, J., Hengartner, U.: On the use of financial data as a random beacon. In: USENIX EVT/WOTE. USENIX Association (2010) Clark, J., Hengartner, U.: On the use of financial data as a random beacon. In: USENIX EVT/WOTE. USENIX Association (2010)
8.
Zurück zum Zitat Dodis, Y., Gennaro, R., Håstad., J., Krawczyk., H., Rabin, T.: Randomness extraction and key derivation using the cbc, cascade and hmac modes. In: Advances in Cryptology – CRYPTO 2004: 24th Annual International Cryptology Conference, pp 494–510. Springer, Berlin (2004) Dodis, Y., Gennaro, R., Håstad., J., Krawczyk., H., Rabin, T.: Randomness extraction and key derivation using the cbc, cascade and hmac modes. In: Advances in Cryptology – CRYPTO 2004: 24th Annual International Cryptology Conference, pp 494–510. Springer, Berlin (2004)
9.
Zurück zum Zitat Garman, C, Green, M, Miers, I, Rubin, A.D.: Rational zero: Economic security for zerocoin with everlasting anonymity. In: Financial Cryptography and Data Security: BITCOIN, pp 140–155. Springer, Berlin (2014) Garman, C, Green, M, Miers, I, Rubin, A.D.: Rational zero: Economic security for zerocoin with everlasting anonymity. In: Financial Cryptography and Data Security: BITCOIN, pp 140–155. Springer, Berlin (2014)
10.
Zurück zum Zitat Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: Analysis and applications. In: Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 2015, Proceedings, Part II, pp. 281–310 (2015) Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: Analysis and applications. In: Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 2015, Proceedings, Part II, pp. 281–310 (2015)
12.
Zurück zum Zitat Miers, I., Garman, C., Green, M., Rubin, A.D. : Zerocoin: Anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 397–411 (2013) Miers, I., Garman, C., Green, M., Rubin, A.D. : Zerocoin: Anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 397–411 (2013)
17.
Zurück zum Zitat Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, pp. 515–532 (2016) Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers, pp. 515–532 (2016)
Metadaten
Titel
Malleability of the blockchain’s entropy
verfasst von
Cécile Pierrot
Benjamin Wesolowski
Publikationsdatum
03.11.2017
Verlag
Springer US
Erschienen in
Cryptography and Communications / Ausgabe 1/2018
Print ISSN: 1936-2447
Elektronische ISSN: 1936-2455
DOI
https://doi.org/10.1007/s12095-017-0264-3

Weitere Artikel der Ausgabe 1/2018

Cryptography and Communications 1/2018 Zur Ausgabe