-
A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off
Authors:
Miodrag J. Mihaljevic
Abstract:
A problem of developing the consensus protocols in public blockchain systems which spend a combination of energy and space resources is addressed. A technique is proposed that provides a flexibility for selection of the energy and space resources which should be spent by a player participating in the consensus procedure. The technique originates from the cryptographic time-memory-data trade-off ap…
▽ More
A problem of developing the consensus protocols in public blockchain systems which spend a combination of energy and space resources is addressed. A technique is proposed that provides a flexibility for selection of the energy and space resources which should be spent by a player participating in the consensus procedure. The technique originates from the cryptographic time-memory-data trade-off approaches for cryptanalysis. The proposed technique avoids the limitations of Proof-of-Work (PoW) and Proof-of Space (PoS) which require spending of only energy and space, respectively. Also, it provides a flexibility for adjusting the resources spending to the system budget. The proposed consensus technique is based on a puzzle where the problem of inverting one-way function is solved employing a dedicated Time-Memory-Data Trade-Off (TMD-TO) paradigm. The algorithms of the consensus protocol are proposed which employ certain unconstrained and constrained TMD-TO based inversions. Security of the proposed technique is considered based on the probability that the honest pool of nodes generate a longer extension of the blockchain before its update, and a condition on the employed parameters in order to achieve desired security have been derived. Implementation complexity of the proposed consensus protocol is discussed and compared with the complexities when PoW and PoS are employed.
△ Less
Submitted 18 November, 2019;
originally announced November 2019.
-
Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm
Authors:
Miodrag J. Mihaljevic,
Frederique Oggier,
Hideki Imai
Abstract:
This paper addresses the design of a dedicated homophonic coding for a class of communication systems which, in order to provide both reliability and security, first encode the data before encrypting it, which is referred to as the encoding-encryption paradigm. The considered systems employ error-correction coding for reliability, a stream cipher for encryption, and homophonic coding to enhance th…
▽ More
This paper addresses the design of a dedicated homophonic coding for a class of communication systems which, in order to provide both reliability and security, first encode the data before encrypting it, which is referred to as the encoding-encryption paradigm. The considered systems employ error-correction coding for reliability, a stream cipher for encryption, and homophonic coding to enhance the protection of the key used in the stream cipher, on which relies the security of all the system transmissions. This paper presents a security evaluation of such systems from a computational complexity point of view, which serves as a source for establishing dedicated homophonic code design criteria. The security evaluation shows that the computational complexity of recovering the secret key, given all the information an attacker could gather during passive attacks he can mount, is lower bounded by the complexity of the related LPN (Learning Parity in Noise) problem in both the average and worst case. This gives guidelines to construct a dedicated homophonic encoder which maximizes the complexity of the underlying LPN problem for a given encoding overhead. Finally, this paper proposes a generic homophonic coding strategy that fulfills the proposed design criteria and thus both enhances security while minimizing the induced overhead.
△ Less
Submitted 29 December, 2010;
originally announced December 2010.
-
An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm
Authors:
Frederique Oggier,
Miodrag J. Mihaljevic
Abstract:
This paper proposes a generic approach for providing enhanced security to communication systems which encode their data for reliability before encrypting it through a stream cipher for security. We call this counter-intuitive technique the {\em encoding-encryption} paradigm, and use as motivating example the standard for mobile telephony GSM. The enhanced security is based on a dedicated homophoni…
▽ More
This paper proposes a generic approach for providing enhanced security to communication systems which encode their data for reliability before encrypting it through a stream cipher for security. We call this counter-intuitive technique the {\em encoding-encryption} paradigm, and use as motivating example the standard for mobile telephony GSM. The enhanced security is based on a dedicated homophonic or wire-tap channel coding that introduces pure randomness, combined with the randomness of the noise occurring over the communication channel. Security evaluation regarding recovery of the secret key employed in the keystream generator is done through an information theoretical approach. We show that with the aid of a dedicated wire-tap encoder, the amount of uncertainty that the adversary must face about the secret key given all the information he could gather during different passive or active attacks he can mount, is a decreasing function of the sample available for cryptanalysis. This means that the wire-tap encoder can indeed provide an information theoretical security level over a period of time, but after a large enough sample is collected the function tends to zero, entering a regime in which a computational security analysis is needed for estimation of the resistance against the secret key recovery.
△ Less
Submitted 5 August, 2010;
originally announced August 2010.