Paper 2019/891
Shielded Computations in Smart Contracts Overcoming Forks
Vincenzo Botta, Daniele Friolo, Daniele Venturi, and Ivan Visconti
Abstract
In this work, we consider executions of smart contracts for implementing secure multi-party computation (MPC) protocols on forking blockchains (e.g., Ethereum), and we study security and delay issues due to forks. In this setting, the classical double-spending problem tells us that messages of the MPC protocol should be confirmed on-chain before playing the next ones, thus slowing down the entire execution. Our contributions are twofold: - For the concrete case of fairly tossing multiple coins with penalties, we notice that the lottery protocol of Andrychowicz et al. (S&P '14) becomes insecure if players do not wait for the confirmations of several transactions. In addition, we present a smart contract that instead retains security even when all honest players immediately answer to transactions appearing on-chain. We analyze the performance using Ethereum as testbed. - We design a compiler that takes any ``digital and universally composable'' MPC protocol (with or without honest majority), and transforms it into another one (for the same task and same setup) which maintains security even if all messages are played on-chain without delays. The special requirements on the starting protocol mean that messages consist only of bits (e.g., no hardware token is sent) and security holds also in the presence of other protocols. We further show that our compiler satisfies fairness with penalties as long as honest players only wait for confirmations once. By reducing the number of confirmations, our protocols can be significantly faster than natural constructions.
Note: This paper has been accepted to Financial Cryptography and Data Security '21
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. Financial Cryptography and Data Security 2021
- Keywords
- MPCblockchainsfinalityforkssmart contracts
- Contact author(s)
-
botta vin @ gmail com
friolo @ di uniroma1 it
venturi @ di uniroma1 it
ivan visconti @ gmail com - History
- 2021-05-10: last of 10 revisions
- 2019-08-05: received
- See all versions
- Short URL
- https://ia.cr/2019/891
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/891, author = {Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti}, title = {Shielded Computations in Smart Contracts Overcoming Forks}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/891}, year = {2019}, url = {https://eprint.iacr.org/2019/891} }