equihash asymmetric proof of work based on the
play

Equihash: Asymmetric Proof-of-Work based on the Generalized - PowerPoint PPT Presentation

Equihash: Asymmetric Proof-of-Work based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich University of Luxembourg February 22nd, 2016 Proof (Prover) Verifiers Proof of Work in cryptocurrencies PoW certificate of


  1. Equihash: Asymmetric Proof-of-Work based on the Generalized Birthday Problem Alex Biryukov Dmitry Khovratovich University of Luxembourg February 22nd, 2016

  2. Proof (Prover) Verifiers Proof of Work in cryptocurrencies PoW – certificate of certain amount of work. In cryptocurrencies: • Verifier – cryptocurrency users; • Prover – cryptocurrency miner.

  3. Proof of Work as a client puzzle In TLS client puzzles: • Verifier – server that establishes a secure connection; • Prover – client that may want to DoS the server with signature computation.

  4. Asymmetric verification Clearly, the proof search

  5. Asymmetric verification Clearly, the proof search must be more expensive than verification

  6. Asymmetric verification HashCash/Bitcoin Proof-of-Work with hash function H : S – proof, if H ( S ) = 00 . . . 0 . � �� � q zeros 2 q calls to H for prover, 1 call for verifier.

  7. But here come ASICs.. Regular cryptographich hash H is 30,000 less expensive on ASIC due to small custom chip.

  8. Solution Since 2003, memory-intensive computations have been proposed. Computing with a lot of memory would require a very large and expensive chip. Memory Core With large memory on-chip, the ASIC advantage vanishes.

  9. Approach 1. Trivial Hash function with two iterations over memory of size N . • V i = F ( V i − 1 ); • V ′ N = V N ; • V ′ i = F ( V ′ i +1 || V i ). X F F F F F F F F F Y F F F F F F F F

  10. Trivial tradeoff Compute the hash using N m + m memory units and 3 N calls to F (instead of 2 N ): • Store every m -th block; • When entering a new interval, precompute its m inputs. √ Optimal point is m = N . X F F F F F F F F F Y F F F F F F F F

  11. Approach 2. Argon2 Memory-hard hashing function, that won Password Hashing Competition in 2015: 4 slices Password p lanes Salt H H Context Tag • Simple randomized-graph design with high-penalty tradeoffs.

  12. Approach 2. Argon2 Memory-hard hashing function, that won Password Hashing Competition in 2015: 4 slices Password p lanes Salt H H Context Tag • Simple randomized-graph design with high-penalty tradeoffs. • However, no easy verification.

  13. Approach 3. Collision search 1 Verifier sends seed S ; 2 Prover generates 2 k 2 k -bit hashes H ( S || 1) , H ( S || 2) , . . . , H ( S || 2 k ). 3 Prover shows a collision H ( S || i ) = H ( S || j ). Short and efficient.

  14. Approach 3. Collision search 1 Verifier sends seed S ; 2 Prover generates 2 k 2 k -bit hashes H ( S || 1) , H ( S || 2) , . . . , H ( S || 2 k ). 3 Prover shows a collision H ( S || i ) = H ( S || j ). Short and efficient. Problem: the ρ -based collision search finds collisions in the same 2 k time but no memory. f i ( x ) = f j ( x ) f 2 ( x ) f ( x ) x

  15. Generalized birthday problem Original: given 2 k lists L j of n -bit strings { X i } , find distinct { X i j ∈ L j } such that X i 1 ⊕ X i 2 ⊕ · · · ⊕ X i 2 k = 0 .

  16. Solution is found by iterative sorting

  17. Wagner’s algorithm n �� � � � � � � � � � k +1 ) time and memory O (2 � � � � � � � � � � � " - � � � � � n • Sort by first k +1 bits; • Store XOR of collisions; � � � � � � � � � � � � � � n • Repeat for next k +1 bits, � � � � � � etc. � � � � � � � � ���� �� . �� ������ �������� ������ �� ��� ��������� ��� ��� (���� ������� � � �� ���� � � � � �� ����� ��� ����� ���� � � � ���� ����� �� ����� � ����� � � � � � � ����� �� � ����" � � ���� ��� ��� ����� ���� ���� ���� ������ �� ��� �������� ������ ����� � �� ���� ��� # � � � & ! � �� ��� ���� �� ��� # � & ! ��� # � & � � � � � � � � ������ ����� � ����� ����� � � � � �� �� � ����� ����� ��� �� � � ���� � � � � � ���� � � � � ������� � � � � � � � � ��� ��� # � � � & ! � �� ����� ��� ��� �� �� ���� � � � � � � � � � � � ������ ����� � !� � � � ! � � � � ���� � � � � � � � ! � � � � � � � � � � ������ ����� � !� ��� # � � � & ! � ��� ��� # � � � & ! � � ���� �� �� �������� � � � � � � � � ���� ��� # � � � � � � � & ! � � ��� �� ���� ��� <� 1 � � � � � � � ! �℄ ! ) � ) � � � � � � � � � � '���� ���� ������ ������� � ��� ��������� ��� ��� .���� �������" ,����� � � � �%���� ��� ����� � � � � � � � �� ��� ���� �� � �� ���� �� ��� ) ������ ��� ����� � �� � � � ��������� �� � � ���������� � ��� �" '���� � � ����� ������ ����� ) �� �������� � ����� ���� � �� � ����� � � � �� � ���� �� � # � � � & ! �" -�������� � � � �� � � � � � �������� � ����� ���� � �� � ����� � � � ����� �� � # � � � & ! �" ,������ � �� � � � � � � � ���� � ��� ��� ��� � �� � ��� � ��� � " =� ������ ����� 0� �� � �� � ��� � �� �� ���� ������� � � � � � � � ! � ��� ��� � ���� ����� � �������� �� ��� .���� � � � � �������" -�� ,����� ) ��� � ������ ���� ���� �� ���� ���������"

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend