, , , , , , ,

[SOLVED] CSCI-GA 3033-107 Cryptography of Blockchains Spring 2024 Homework 2

$25

File Name: CSCI_GA_3033_107_Cryptography_of_Blockchains_Spring_2024_Homework_2.zip
File Size: 631.14 KB

5/5 - (1 vote)

CSCI-GA.3033-107: Cryptography of Blockchains

Spring 2024

Homework #2

Due: 11:59pm on Sunday, 3/10, 2024

Submit via Brightspace

Problem 1. Distributed Randomness Beacons using VDFs. A distributed randomness beacon

(DRB) allows mutually untrusted parties to engage in a protocol and derive a random value ω that

cannot be biased by any party. Consider the verifiable delay function VDF(x) : G → G = x2t

where (G, ·) is a multiplicative group of unknown order. Let g be a generator of G and let

h = VDF(g). Consider the following one-round protocol DRB1:

Round 1: Each party reveals a random value ri.

Suppose n parties participate in Round 1. The DRB output is obtained as ω = (
!

n

i=1

ri)2t
∈ G.

a. Show that this protocol is not secure and can be biased. That is, describe an attack an

adversary acting as of the parties can perform. that lets them set the DRB output to any

value they want. (Note the adversary can get preparation time before the protocol starts.)

b. Suggest a solution to this attack based on the solution used to prevent the rogue-key attack

when aggregating BLS signatures. (You need not prove your answer. A brief justification is

enough.)

An issue with the VDF-based DRBs is that they always require a costly VDF computation

to be done. Consider the following protocol DRB2:

Round 1: Commit Round: Each party i samples a random nonce αi and shares ci = gαi .

Round 2: Reveal Round: After all parties share their commitments, each party reveals αi. (If

ci = gαi then this αi is ignored by the other parties).

Suppose n parties participate in Round 1. There are two scenarios here, based on the behavior.

of the n parties in Round 2. The optimistic scenario allows all the parties to compute the

output quickly while the pessimistic one resorts to the costly VDF computation.

• Optimistic case: If all n parties reveal a valid nonce in Round 2, then the DRB output

ω is quickly obtained as ω = !

n

i=1

hαi .

• Pessimistic case: If any party skips Round 2, then the DRB output is obtained by the

others as ω = VDF(
!

n

i=1

ci).

(You may verify that the randomness obtained in the two cases is the same.)

c. This scheme also suffers from a biasing attack similar to the one in part (a). Show how.

d. As in part (b), write out a solution that prevents the above attack. (Again, it’s based on the

technique used in BLS signature aggregation. And you need not formally prove security.)

e. Even after this fix, there is an inherent weakness associated with any DRB that has an

“optimistic” fast case and a “pessimistic” slow case. Show how one party participating in the

protocol can learn ω much faster than all the other parties. (Note that they don’t bias the

value. They only learn it much faster than the others.)

1Problem 2. More VDFs

a. Is Proof-of-Work a VDF? Why or why not? If it is, describe the VDF input, output, and

prove and verify functions. If not, describe what property of a VDF is not satisfied.

b. Can a VDF be used as a Proof-of-Work function? For a given challenge ch, the goal of the

miner to now produce a valid output and proof for a given VDF function on input ch.

c. A commonly used randomness beacon is the Bitcoin blockchain. Suppose random value r

is obtained by hashing the latest block header b as r = H(b). What is one issue with this

method? (Hint: think about which parties can bias the randomness.)

d. What if the randomness is obtained by hashing the VDF output on the header, instead? That

is, r = H(VDF(b)). Briefly explain (doesn’t have to be formal) how this is secure or insecure.

Problem 3. Certificates of Correctness

In class, we so far have seen ways to obtain quorum certificates where each signature has equal

weight. What if we want to extend this to a scenario where different nodes have different weights?

This may be the scenario in a Proof-of-Stake blockchain where the more stake you have, the more

your vote counts. Instead of needing 2/3rd of all miners for a quorum, you need 2/3rd of all the

weight (that is, stake).

a. Let node i have weight wi for i = 1, . . . , n. Modify the Merkle tree construction for QC to

show that some fraction x of all stake is in the quorum. Hint: Assume the total stake is

T = ”

n

i=1

wi. The Merkle tree should enable the verifier to query a value q between 0 and T

and the prover returns the leaf wi

, such that ”

i

−1

i

=1

wi < q and ”

i

i

=1

wi >= q. The Merkle

tree needs to track more information than just the hashes in order to do this.

Problem 4. Security of Wesolowski VDF

This question will analyze the role of the prime challenge ℓ in Wesolowski VDFs. To establish

notation, the input is (G, g, h,t), w here g, h ∈ G and the prover claim is that h = g2t
. The

verifier sends a challenge ℓ, which is a prime. The prover responds π where π = gq and 2t = qℓ+r

and r < ℓ. The

a. Show that the scheme isn’t secure when ℓ ≈ 2λ is the product of small primes each less than

k (for some constant k), by describing an attack that runs in time O(k · λ) group operations.

Problem 5. Batching Polynomial Commitments

In this question, we’ll build and efficient batch evaluation proofs from a linearly homomor

phic polynomial commitment scheme. Here, a prover P and verifier V have input polynomials

f0, . . . , fℓ−1 ∈ F<d[X]. The prover claims that fi(ωi) = 0 for all i = 0, . . . , ℓ − 1 and elements

ω0, . . . , ωℓ−1. The interactive protocol with a non-succinct verifier to prove the following is:

1. V sends P a challenge ρ ∈ F.

2. P sends V the polynomial q(X) = ”

i=

0
1

ρi
fi(X)/(X − ωi).

3. V sends P a challenge r ∈ F.

24. Let z(X) = !

i=

0
1

(X − ωi) and zi(X) = z(X)/(X − ωi). V computes the polynomials

g(X) = #”

i=

0
1

ρi
zi(r) · fi(X)
$
− z(r) · q(X)

5. V accepts if g(r) = 0.

The verifier can be made succinct using polynomial commitments. In this setting, the input

additionally contains commitments C0, . . . , Cℓ−1 to the polynomials f0, . . . , fℓ−1. In the questions

below, you will work out how the steps change when using polynomial commitment schemes.

a. In step 2 above, the prover will send a commitment Cq to polynomial q(X). Using Cq and

all other inputs and challenges, show how the verifier can compute a commitment Cg to

polynomial g(X) in Step 4 efficiently.

b. How does step 5 change when using polynomial commitments? (Note the succinct verifier

only has commitment to q(X) and g(X).)

We’ll generalize the protocol to prove the claim fi(ω) = vi for i = 0, . . . , ℓ − 1.

c. What is the new q in this scenario? And how does V compute Cg(X)? Short one-line answers

are sufficient. (Hint: reduce this to the original case by modifying the polynomials sent as

input.)

3

Shopping Cart
[SOLVED] CSCI-GA 3033-107 Cryptography of Blockchains Spring 2024 Homework 2
$25