Paper 2024/669

Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses

Arka Rai Choudhuri, NTT Research
Sanjam Garg, University of California, Berkeley
Julien Piet, University of California, Berkeley
Guru-Vamsi Policharla, University of California, Berkeley
Abstract

With the rising popularity of DeFi applications it is important to implement protections for regular users of these DeFi platforms against large parties with massive amounts of resources allowing them to engage in market manipulation strategies such as frontrunning/backrunning. Moreover, there are many situations (such as recovery of funds from vulnerable smart contracts) where a user may not want to reveal their transaction until it has been executed. As such, it is clear that preserving the privacy of transactions in the mempool is an important goal. In this work we focus on achieving mempool transaction privacy through a new primitive that we term batched-threshold encryption, which is a variant of threshold encryption with strict efficiency requirements to better model the needs of resource constrained environments such as blockchains. Unlike the naive use of threshold encryption, which requires communication proportional to $O(nB)$ to decrypt $B$ transactions with a committee of $n$ parties, our batched-threshold encryption scheme only needs $O(n)$ communication. We additionally discuss pitfalls in prior approaches that use (vanilla) threshold encryption for mempool privacy. To show that our scheme is concretely efficient, we implement our scheme and find that transactions can be encrypted in under 6 ms, independent of committee size, and the communication required to decrypt an entire batch of $B$ transactions is 80 bytes per party, independent of the number of transactions $B$, making it an attractive choice when communication is very expensive. If deployed on Ethereum, which processes close to 500 transaction per block, it takes close to 2.8 s for each committee member to compute a partial decryption and under 3.5 s to decrypt all transactions for a block in single-threaded mode.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. USENIX Security 2024
Keywords
Threshold EncryptionEncrypted MempoolsDeFi
Contact author(s)
arkarai choudhuri @ gmail com
sanjamg @ berkeley edu
julien piet @ berkeley edu
guruvamsi policharla @ gmail com
History
2024-05-20: revised
2024-05-02: received
See all versions
Short URL
https://ia.cr/2024/669
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/669,
      author = {Arka Rai Choudhuri and Sanjam Garg and Julien Piet and Guru-Vamsi Policharla},
      title = {Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/669},
      year = {2024},
      url = {https://eprint.iacr.org/2024/669}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.