Accountable Secret Leader Election

Authors Miranda Christ, Kevin Choi, Walter McKelvie, Joseph Bonneau, Tal Malkin



PDF
Thumbnail PDF

File

LIPIcs.AFT.2024.1.pdf
  • Filesize: 0.83 MB
  • 21 pages

Document Identifiers

Author Details

Miranda Christ
  • Columbia University, New York, NY, USA
Kevin Choi
  • New York University, NY, USA
Walter McKelvie
  • Columbia University, New York, NY, USA
Joseph Bonneau
  • New York University, NY, USA
  • a16z crypto research, New York, NY, USA
Tal Malkin
  • Columbia University, New York, NY, USA

Cite AsGet BibTex

Miranda Christ, Kevin Choi, Walter McKelvie, Joseph Bonneau, and Tal Malkin. Accountable Secret Leader Election. In 6th Conference on Advances in Financial Technologies (AFT 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 316, pp. 1:1-1:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.AFT.2024.1

Abstract

We consider the problem of secret leader election with accountability. Secret leader election protocols counter adaptive adversaries by keeping the identities of elected leaders secret until they choose to reveal themselves, but in existing protocols this means it is impossible to determine who was elected leader if they fail to act. This opens the door to undetectable withholding attacks, where leaders fail to act in order to slow the protocol or bias future elections in their favor. We formally define accountability (in weak and strong variants) for secret leader election protocols. We present three paradigms for adding accountability, using delay-based cryptography, enforced key revelation, or threshold committees, all of which ensure that after some time delay the result of the election becomes public. The paradigm can be chosen to balance trust assumptions, protocol efficiency, and the length of the delay before leaders are revealed. Along the way, we introduce several new cryptographic tools including re-randomizable timed commitments and timed VRFs.

Subject Classification

ACM Subject Classification
  • Security and privacy → Cryptography
Keywords
  • Consensus Protocols
  • Single Secret Leader Election
  • Accountability

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Arasu Arun, Joseph Bonneau, and Jeremy Clark. Short-lived zero-knowledge proofs and signatures. In Asiacrypt, 2022. Google Scholar
  2. Sarah Azouvi, Patrick McCorry, and Sarah Meiklejohn. Betting on Blockchain Consensus with Fantomette. arXiv preprint, 2018. URL: https://arxiv.org/abs/1805.06786.
  3. Sarah Azouvi, Patrick McCorry, and Sarah Meiklejohn. Winning the caucus race: Continuous leader election via public randomness. arXiv preprint, 2018. URL: https://arxiv.org/abs/1801.07965.
  4. Michael Backes, Pascal Berrang, Lucjan Hanzlik, and Ivan Pryvalov. A framework for constructing Single Secret Leader Election from MPC. In ESORICS, 2022. Google Scholar
  5. Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, and Alberto Sonnino. STROBE: Stake-based Threshold Random Beacons. In AFT, 2023. Google Scholar
  6. Dan Boneh, Joseph Bonneau, Benedikt Bünz, and Ben Fisch. Verifiable Delay Functions. In CRYPTO, 2018. Google Scholar
  7. Dan Boneh, Benedikt Bünz, and Ben Fisch. A Survey of Two Verifiable Delay Functions. Cryptology ePrint Archive, Paper 2018/712, 2018. Google Scholar
  8. Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, and Nicola Greco. Single secret leader election. In AFT, 2020. Google Scholar
  9. Dan Boneh and Moni Naor. Timed commitments. In CRYPTO, 2000. Google Scholar
  10. Dan Boneh, Aditi Partap, and Lior Rotem. Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments. In AFT, 2023. Google Scholar
  11. Zvika Brakerski, Shafi Goldwasser, Guy N Rothblum, and Vinod Vaikuntanathan. Weak Verifiable Random Functions. In TCC, 2009. Google Scholar
  12. Dario Catalano, Dario Fiore, and Emanuele Giunta. Adaptively secure single secret leader election from DDH. In PODC, 2022. Google Scholar
  13. Dario Catalano, Dario Fiore, and Emanuele Giunta. Efficient and universally composable single secret leader election from pairings. In PKC, 2023. Google Scholar
  14. Kevin Choi, Aathira Manoj, and Joseph Bonneau. SoK: Distributed Randomness Beacons. In IEEE Security & Privacy, 2023. Google Scholar
  15. Geoffroy Couteau, Michael Klooß, Huang Lin, and Michael Reichle. Efficient range proofs with transparent setup from bounded integer commitments. In Eurocrypt, 2021. Google Scholar
  16. Yevgeniy Dodis and Aleksandr Yampolskiy. A verifiable random function with short proofs and keys. In PKC, 2005. Google Scholar
  17. Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, and Raymond K. Zhao. A new look at blockchain leader election: Simple, efficient, sustainable and post-quantum. Cryptology ePrint Archive, Paper 2022/993, 2022. Google Scholar
  18. Dankrad Feist. RSA Assumptions. rsa.cash/rsa-assumptions/, 2022.
  19. Matheus VX Ferreira, Ye Lin Sally Hahn, S Matthew Weinberg, and Catherine Yu. Optimal Strategic Mining Against Cryptographic Self-Selection in Proof-of-Stake. In Economics and Computation, 2022. Google Scholar
  20. Chaya Ganesh, Claudio Orlandi, and Daniel Tschudi. Proof-of-stake protocols for privacy-aware blockchains. In Eurocrypt, 2019. Google Scholar
  21. Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, and Sophia Yakoubov. YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. In CRYPTO, 2021. Google Scholar
  22. dapplion George Kadianakis, Justin Drake. EIP-7441: Upgrade block proposer election to Whisk. URL: https://eips.ethereum.org/EIPS/eip-7441.
  23. Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. Algorand: Scaling byzantine agreements for cryptocurrencies. In SOSP, 2017. Google Scholar
  24. Neil Haller. The S/KEY one-time password system. In NDSS, 1994. Google Scholar
  25. Alireza Kavousi, Zhipeng Wang, and Philipp Jovanovic. SoK: Public Randomness. Cryptology ePrint Archive, Paper 2023/1121, 2023. Google Scholar
  26. Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss, and Vassilis Zikas. Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake. In IEEE Security & Privacy, 2019. Google Scholar
  27. Silvio Micali, Michael Rabin, and Salil Vadhan. Verifiable random functions. In FOCS, 1999. Google Scholar
  28. Adrian Perrig, , Ran Canetti, JD Tygar, and Dawn Song. Tesla broadcast authentication. RSA CryptoBytes, 5, 2002. Google Scholar
  29. Krzysztof Pietrzak. Simple verifiable delay functions. In ITCS, 2018. Google Scholar
  30. Protocol Labs. Secret single-leader election (SSLE). URL: https://github.com/protocol/research-RFPs/blob/master/RFPs/rfp-6-SSLE.md.
  31. Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, and Edgar Weippl. RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. In NDSS, 2020. Google Scholar
  32. Toni Wahrstätter. Selfish Mixing and RANDAO Manipulation. ethresear.ch/t/selfish-mixing-and-randao-manipulation/16081, 2023.
  33. Benjamin Wesolowski. Efficient verifiable delay functions. In Eurocrypt, 2019. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail