Delegated Time-Lock Puzzle

08/02/2023
by   Aydin Abadi, et al.
0

Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a client to lock a message in such a way that a server can only unlock it after a specific time period. However, existing TLPs have certain limitations: (i) they assume that both the client and server always possess sufficient computational resources and (ii) they solely focus on the lower time bound for finding a solution, disregarding the upper bound that guarantees a regular server can find a solution within a certain time frame. Additionally, existing TLPs designed to handle multiple puzzles either (a) entail high verification costs or (b) lack generality, requiring identical time intervals between consecutive solutions. To address these limitations, this paper introduces, for the first time, the concept of a "Delegated Time-Lock Puzzle" and presents a protocol called "Efficient Delegated Time-Lock Puzzle" (ED-TLP) that realises this concept. ED-TLP allows the client and server to delegate their resource-demanding tasks to third-party helpers. It facilitates real-time verification of solution correctness and efficiently handles multiple puzzles with varying time intervals. ED-TLP ensures the delivery of solutions within predefined time limits by incorporating both an upper bound and a fair payment algorithm. We have implemented ED-TLP and conducted a comprehensive analysis of its overheads, demonstrating the efficiency of the construction.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/11/2021

Optimizing Fund Allocation for Game-based Verifiable Computation Outsourcing

This paper considers the setting where a cloud server services a static ...
research
06/14/2023

Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext

Using the computational resources of an untrusted third party to crack a...
research
12/12/2017

Small-Scale Markets for Bilateral Resource Trading in the Sharing Economy

We consider a general small-scale market for agent-to-agent resource sha...
research
04/10/2017

Prover efficient public verification of dense or sparse/structured matrix-vector multiplication

With the emergence of cloud computing services, computationally weak dev...
research
11/13/2020

iHorology: Lowering the Barrier to Microsecond-level Internet Time

High precision, synchronized clocks are essential to a growing number of...
research
07/24/2020

Dynamic proofs of retrievability with low server storage

Proofs of Retrievability (PoRs) are protocols which allow a client to st...
research
08/22/2022

ABL: An original active blacklist based on a modification of the SMTP

This paper presents a novel Active Blacklist (ABL) based on a modificati...

Please sign up or login with your details

Forgot password? Click here to reset