首页 > 最新文献

IACR Cryptology ePrint Archive最新文献

英文 中文
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM QROM中提交-开放协议的有效nizk和签名
Pub Date : 2022-02-28 DOI: 10.1007/978-3-031-15979-4_25
Jelle Don, S. Fehr, Christian Majenz, Christian Schaffner
{"title":"Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM","authors":"Jelle Don, S. Fehr, Christian Majenz, Christian Schaffner","doi":"10.1007/978-3-031-15979-4_25","DOIUrl":"https://doi.org/10.1007/978-3-031-15979-4_25","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114296151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On Codes and Learning With Errors over Function Fields 函数域上的代码与错误学习
Pub Date : 2022-02-28 DOI: 10.1007/978-3-031-15979-4_18
Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard
{"title":"On Codes and Learning With Errors over Function Fields","authors":"Maxime Bombar, Alain Couvreur, Thomas Debris-Alazard","doi":"10.1007/978-3-031-15979-4_18","DOIUrl":"https://doi.org/10.1007/978-3-031-15979-4_18","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Limits of Preprocessing for Single-Server PIR 单服务器PIR的预处理限制
Pub Date : 2022-01-01 DOI: 10.1137/1.9781611977073.99
G. Persiano, Kevin Yeo
We present a lower bound for the static cryptographic data structure problem of single-server private information retrieval (PIR) . PIR considers the setting where a server holds a database of n entries and a client wishes to privately retrieve the i -th entry without revealing the index i to the server. In our work, we focus on PIR with preprocessing where an r -bit hint may be computed in a preprocessing stage and stored by the server to be used to perform private queries in expected time t . We consider the public preprocessing setting of Beimel et al. [JoC, 2004] where the hint is publicly available to everyone including the adversary. We prove that for any single-server computationally secure PIR with preprocessing it must be that tr = Ω( n log n ) when r = Ω(log n ). If r = O (log n ), we show that t = Ω( n ). Our lower bound holds even when the scheme errs with probability 1 /n 2 and the adversary’s distinguishing advantage is 1 /n . Our work improves upon the tr = Ω( n ) lower bound of Beimel et al. [JoC, 2004]. We prove our lower bound in a variant of the cell probe model where only accesses to the memory are charged cost and computation and accesses to the hint are free. Our main technical contribution is a novel use of the cell sampling technique (also known as the incompressibility technique) used to obtain lower bounds on data structures. In previous works, this technique only leveraged the correctness guarantees to prove lower bounds even when used for cryptographic primitives. Our work combines the cell sampling technique with the privacy guarantees of PIR to construct a powerful, polynomial-time adversary that is critical to proving our higher lower bounds.
给出了单服务器私有信息检索(PIR)静态密码数据结构问题的下界。PIR考虑这样一种设置:服务器持有一个包含n个条目的数据库,客户机希望私下检索第i个条目,而不向服务器透露索引i。在我们的工作中,我们关注带有预处理的PIR,其中一个r位提示可以在预处理阶段计算,并由服务器存储,用于在预期时间t内执行私有查询。我们考虑Beimel等人[JoC, 2004]的公开预处理设置,其中暗示对包括对手在内的所有人都是公开的。我们证明了对于任何具有预处理的单服务器计算安全PIR,当r = Ω(log n)时,tr = Ω(n log n)。如果r = O (log n)我们证明t = Ω(n)我们的下界即使在方案出错的概率为1 /n / 2且对手的显著优势为1 /n时也成立。我们的工作改进了Beimel等人的tr = Ω(n)下界[JoC, 2004]。我们在单元探测模型的一个变体中证明了我们的下界,其中只有访问内存是收费的,计算和访问提示是免费的。我们的主要技术贡献是对单元采样技术(也称为不可压缩技术)的新颖使用,用于获得数据结构的下界。在以前的工作中,该技术仅利用正确性保证来证明下界,即使在用于加密原语时也是如此。我们的工作将单元采样技术与PIR的隐私保证相结合,构建了一个强大的多项式时间对手,这对于证明我们的上下界至关重要。
{"title":"Limits of Preprocessing for Single-Server PIR","authors":"G. Persiano, Kevin Yeo","doi":"10.1137/1.9781611977073.99","DOIUrl":"https://doi.org/10.1137/1.9781611977073.99","url":null,"abstract":"We present a lower bound for the static cryptographic data structure problem of single-server private information retrieval (PIR) . PIR considers the setting where a server holds a database of n entries and a client wishes to privately retrieve the i -th entry without revealing the index i to the server. In our work, we focus on PIR with preprocessing where an r -bit hint may be computed in a preprocessing stage and stored by the server to be used to perform private queries in expected time t . We consider the public preprocessing setting of Beimel et al. [JoC, 2004] where the hint is publicly available to everyone including the adversary. We prove that for any single-server computationally secure PIR with preprocessing it must be that tr = Ω( n log n ) when r = Ω(log n ). If r = O (log n ), we show that t = Ω( n ). Our lower bound holds even when the scheme errs with probability 1 /n 2 and the adversary’s distinguishing advantage is 1 /n . Our work improves upon the tr = Ω( n ) lower bound of Beimel et al. [JoC, 2004]. We prove our lower bound in a variant of the cell probe model where only accesses to the memory are charged cost and computation and accesses to the hint are free. Our main technical contribution is a novel use of the cell sampling technique (also known as the incompressibility technique) used to obtain lower bounds on data structures. In previous works, this technique only leveraged the correctness guarantees to prove lower bounds even when used for cryptographic primitives. Our work combines the cell sampling technique with the privacy guarantees of PIR to construct a powerful, polynomial-time adversary that is critical to proving our higher lower bounds.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"70 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129640492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over 픽2 二次多项式系统的一个简单确定性算法
Pub Date : 2022-01-01 DOI: 10.1137/1.9781611977066.22
Charles Bouillaguet, Claire Delaplace, Monika Trimoska
This article discusses a simple deterministic algorithm for solving quadratic Boolean systems which is essentially a special case of more sophisticated methods. The main idea fits in a single sentence: guess enough variables so that the remaining quadratic equations can be solved by linearization (i.e. by considering each remaining monomial as an independent variable and solving the resulting linear system) and restart until the solution is found. Under strong heuristic assumptions, this finds all the solutions of m quadratic polynomials in n variables with Õ ( 2n− √ 2m ) operations. Although the best known algorithms require exponentially less time, the present technique has the advantage of being simpler to describe and easy to implement. In strong contrast with the state-of-the-art, it is also quite efficient in practice.
本文讨论了求解二次布尔系统的一种简单的确定性算法,它本质上是更复杂方法的一个特例。其主要思想可以用一句话概括:猜测足够多的变量,以便剩余的二次方程可以通过线性化(即将每个剩余的单项式视为自变量并求解结果线性系统)来求解,然后重新开始,直到找到解为止。在强启发式假设下,用Õ (2n−√2m)运算求出n个变量的m个二次多项式的所有解。虽然最著名的算法需要的时间要少得多,但目前的技术具有更简单的描述和易于实现的优点。与最先进的技术形成鲜明对比的是,它在实践中也相当高效。
{"title":"A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over 픽2","authors":"Charles Bouillaguet, Claire Delaplace, Monika Trimoska","doi":"10.1137/1.9781611977066.22","DOIUrl":"https://doi.org/10.1137/1.9781611977066.22","url":null,"abstract":"This article discusses a simple deterministic algorithm for solving quadratic Boolean systems which is essentially a special case of more sophisticated methods. The main idea fits in a single sentence: guess enough variables so that the remaining quadratic equations can be solved by linearization (i.e. by considering each remaining monomial as an independent variable and solving the resulting linear system) and restart until the solution is found. Under strong heuristic assumptions, this finds all the solutions of m quadratic polynomials in n variables with Õ ( 2n− √ 2m ) operations. Although the best known algorithms require exponentially less time, the present technique has the advantage of being simpler to describe and easy to implement. In strong contrast with the state-of-the-art, it is also quite efficient in practice.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal Oblivious Parallel RAM 最佳遗忘并行RAM
Pub Date : 2022-01-01 DOI: 10.1137/1.9781611977073.98
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, E. Peserico, E. Shi
An oblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (STOC ’87 and J. ACM ’96), is a technique for hiding RAM’s access pattern. That is, for every input the distribution of the observed locations accessed by the machine is essentially independent of the machine’s secret inputs. Recent progress culminated in a work of Asharov et al. (EUROCRYPT ’20), obtaining an ORAM with (amortized) logarithmic overhead in total work, which is known to be optimal. Oblivious Parallel RAM (OPRAM) is a natural extension of ORAM to the (more realistic) parallel setting where several processors make concurrent accesses to a shared memory. It is known that any OPRAM must incur logarithmic work overhead and for highly parallel RAMs a logarithmic depth blowup (in the balls and bins model). Despite the significant recent advances, there is still a large gap: all existing OPRAM schemes incur a poly-logarithmic overhead either in total work or in depth. Our main result closes the aforementioned gap and provides an essentially optimal OPRAM scheme. Specifically, assuming one-way functions, we show that any Parallel RAM with memory capacity N can be obliviously simulated in space O(N), incurring only O(logN) blowup in (amortized) total work as well as in depth. Our transformation supports all PRAMs in the CRCW mode and the resulting simulation is in the CRCW mode as well. Bar-Ilan University. NTT Research and Hebrew University of Jerusalem. Cornell University. Università degli Studi di Padova. Cornell University and CMU.
由Goldreich和Ostrovsky (STOC ' 87和J. ACM ' 96)提出的遗忘RAM (ORAM)是一种隐藏RAM访问模式的技术。也就是说,对于每个输入,机器访问的观察位置的分布基本上与机器的秘密输入无关。最近的进展在Asharov等人(EUROCRYPT ' 20)的工作中达到顶峰,他们获得了一个总工作量(平摊)对数开销的ORAM,这是已知的最优的。遗忘并行RAM (OPRAM)是ORAM对(更现实的)并行设置的自然扩展,其中多个处理器并发访问共享内存。众所周知,任何OPRAM都会产生对数级的工作开销,对于高度并行的ram,会产生对数级的深度爆炸(在球和箱模型中)。尽管最近取得了重大进展,但仍然存在很大差距:所有现有的OPRAM方案在总工作或深度上都会产生多对数开销。我们的主要结果缩小了上述差距,并提供了一个本质上最优的OPRAM方案。具体地说,假设单向函数,我们表明任何具有内存容量N的并行RAM都可以在空间O(N)中进行模拟,在(平摊)总工作和深度上只产生O(logN)的爆炸。我们的转换支持CRCW模式下的所有pram,并且得到的仿真也在CRCW模式下。巴伊兰大学。NTT研究和耶路撒冷希伯来大学。康奈尔大学。帕多瓦大学。康奈尔大学和CMU。
{"title":"Optimal Oblivious Parallel RAM","authors":"Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, E. Peserico, E. Shi","doi":"10.1137/1.9781611977073.98","DOIUrl":"https://doi.org/10.1137/1.9781611977073.98","url":null,"abstract":"An oblivious RAM (ORAM), introduced by Goldreich and Ostrovsky (STOC ’87 and J. ACM ’96), is a technique for hiding RAM’s access pattern. That is, for every input the distribution of the observed locations accessed by the machine is essentially independent of the machine’s secret inputs. Recent progress culminated in a work of Asharov et al. (EUROCRYPT ’20), obtaining an ORAM with (amortized) logarithmic overhead in total work, which is known to be optimal. Oblivious Parallel RAM (OPRAM) is a natural extension of ORAM to the (more realistic) parallel setting where several processors make concurrent accesses to a shared memory. It is known that any OPRAM must incur logarithmic work overhead and for highly parallel RAMs a logarithmic depth blowup (in the balls and bins model). Despite the significant recent advances, there is still a large gap: all existing OPRAM schemes incur a poly-logarithmic overhead either in total work or in depth. Our main result closes the aforementioned gap and provides an essentially optimal OPRAM scheme. Specifically, assuming one-way functions, we show that any Parallel RAM with memory capacity N can be obliviously simulated in space O(N), incurring only O(logN) blowup in (amortized) total work as well as in depth. Our transformation supports all PRAMs in the CRCW mode and the resulting simulation is in the CRCW mode as well. Bar-Ilan University. NTT Research and Hebrew University of Jerusalem. Cornell University. Università degli Studi di Padova. Cornell University and CMU.","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Post-Quantum Security of the Even-Mansour Cipher Even-Mansour密码的后量子安全性
Pub Date : 2021-12-14 DOI: 10.1007/978-3-031-07082-2_17
G. Alagic, Chen-Ming Bai, Jonathan Katz, Christian Majenz
{"title":"Post-Quantum Security of the Even-Mansour Cipher","authors":"G. Alagic, Chen-Ming Bai, Jonathan Katz, Christian Majenz","doi":"10.1007/978-3-031-07082-2_17","DOIUrl":"https://doi.org/10.1007/978-3-031-07082-2_17","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"9 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116923112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Quantum commitments and signatures without one-way functions 没有单向函数的量子承诺和签名
Pub Date : 2021-12-13 DOI: 10.1007/978-3-031-15802-5_10
T. Morimae, Takashi Yamakawa
{"title":"Quantum commitments and signatures without one-way functions","authors":"T. Morimae, Takashi Yamakawa","doi":"10.1007/978-3-031-15802-5_10","DOIUrl":"https://doi.org/10.1007/978-3-031-15802-5_10","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114772843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security 基于混沌和Logistic映射的aes驱动物联网安全密钥生成技术
Pub Date : 2021-11-22 DOI: 10.1007/978-3-030-91424-0_11
Ziaur Rahman, X. Yi, I. Khalil, M. Sumi
{"title":"Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security","authors":"Ziaur Rahman, X. Yi, I. Khalil, M. Sumi","doi":"10.1007/978-3-030-91424-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-91424-0_11","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round 最小假设下的后量子可模拟提取:黑盒和常轮
Pub Date : 2021-11-16 DOI: 10.1007/978-3-031-15982-4_18
Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Takashi Yamakawa
{"title":"Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round","authors":"Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Takashi Yamakawa","doi":"10.1007/978-3-031-15982-4_18","DOIUrl":"https://doi.org/10.1007/978-3-031-15982-4_18","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130552276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Foundations of Transaction Fee Mechanism Design 交易费用机制设计的基础
Pub Date : 2021-11-04 DOI: 10.1137/1.9781611977554.ch150
Hao Chung, E. Shi
In blockchains such as Bitcoin and Ethereum, users compete in a transaction fee auction to get their transactions confirmed in the next block. A line of recent works set forth the desiderata for a"dream"transaction fee mechanism (TFM), and explored whether such a mechanism existed. A dream TFM should satisfy 1) user incentive compatibility (UIC), i.e., truthful bidding should be a user's dominant strategy; 2) miner incentive compatibility (MIC), i.e., the miner's dominant strategy is to faithfully implement the prescribed mechanism; and 3) miner-user side contract proofness (SCP), i.e., no coalition of the miner and one or more user(s) can increase their joint utility by deviating from the honest behavior. The weakest form of SCP is called 1-SCP, where we only aim to provide resilience against the collusion of the miner and a single user. Sadly, despite the various attempts, to the best of knowledge, no existing mechanism can satisfy all three properties in all situations. Since the TFM departs from classical mechanism design in modeling and assumptions, to date, our understanding of the design space is relatively little. In this paper, we further unravel the mathematical structure of transaction fee mechanism design by proving the following results: - Can we have a dream TFM? - Rethinking the incentive compatibility notions. - Do the new design elements make a difference?
在比特币和以太坊等区块链中,用户在交易费拍卖中竞争,以在下一个区块中确认他们的交易。最近的一系列作品提出了对“梦想”交易费用机制(TFM)的渴望,并探讨了这种机制是否存在。一个梦幻TFM应该满足1)用户激励兼容性(UIC),即真实竞价应该是用户的主导策略;2)矿工激励兼容性(MIC),即矿工的主导策略是忠实地执行规定的机制;3)矿工-用户方合同证明(SCP),即矿工和一个或多个用户的联盟不能通过偏离诚实行为来增加他们的共同效用。最弱的SCP形式被称为1-SCP,我们的目标只是提供抵御矿工和单个用户勾结的弹性。遗憾的是,尽管进行了各种尝试,但据我所知,没有一种现有机制能够在所有情况下满足所有这三个特性。由于TFM在建模和假设方面偏离了经典的机制设计,到目前为止,我们对设计空间的理解相对较少。在本文中,我们进一步揭示了交易费机制设计的数学结构,证明了以下结果:—我们可以有一个梦想的TFM吗?-重新思考激励兼容性概念。-新的设计元素有什么不同吗?
{"title":"Foundations of Transaction Fee Mechanism Design","authors":"Hao Chung, E. Shi","doi":"10.1137/1.9781611977554.ch150","DOIUrl":"https://doi.org/10.1137/1.9781611977554.ch150","url":null,"abstract":"In blockchains such as Bitcoin and Ethereum, users compete in a transaction fee auction to get their transactions confirmed in the next block. A line of recent works set forth the desiderata for a\"dream\"transaction fee mechanism (TFM), and explored whether such a mechanism existed. A dream TFM should satisfy 1) user incentive compatibility (UIC), i.e., truthful bidding should be a user's dominant strategy; 2) miner incentive compatibility (MIC), i.e., the miner's dominant strategy is to faithfully implement the prescribed mechanism; and 3) miner-user side contract proofness (SCP), i.e., no coalition of the miner and one or more user(s) can increase their joint utility by deviating from the honest behavior. The weakest form of SCP is called 1-SCP, where we only aim to provide resilience against the collusion of the miner and a single user. Sadly, despite the various attempts, to the best of knowledge, no existing mechanism can satisfy all three properties in all situations. Since the TFM departs from classical mechanism design in modeling and assumptions, to date, our understanding of the design space is relatively little. In this paper, we further unravel the mathematical structure of transaction fee mechanism design by proving the following results: - Can we have a dream TFM? - Rethinking the incentive compatibility notions. - Do the new design elements make a difference?","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
IACR Cryptology ePrint Archive
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1