Paper 2019/891

Shielded Computations in Smart Contracts Overcoming Forks

Vincenzo Botta, Daniele Friolo, Daniele Venturi, and Ivan Visconti

Abstract

In this work, we consider executions of smart contracts for implementing secure multi-party computation (MPC) protocols on forking blockchains (e.g., Ethereum), and we study security and delay issues due to forks. In this setting, the classical double-spending problem tells us that messages of the MPC protocol should be confirmed on-chain before playing the next ones, thus slowing down the entire execution. Our contributions are twofold: - For the concrete case of fairly tossing multiple coins with penalties, we notice that the lottery protocol of Andrychowicz et al. (S&P '14) becomes insecure if players do not wait for the confirmations of several transactions. In addition, we present a smart contract that instead retains security even when all honest players immediately answer to transactions appearing on-chain. We analyze the performance using Ethereum as testbed. - We design a compiler that takes any ``digital and universally composable'' MPC protocol (with or without honest majority), and transforms it into another one (for the same task and same setup) which maintains security even if all messages are played on-chain without delays. The special requirements on the starting protocol mean that messages consist only of bits (e.g., no hardware token is sent) and security holds also in the presence of other protocols. We further show that our compiler satisfies fairness with penalties as long as honest players only wait for confirmations once. By reducing the number of confirmations, our protocols can be significantly faster than natural constructions.

Note: This paper has been accepted to Financial Cryptography and Data Security '21

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Major revision. Financial Cryptography and Data Security 2021
Keywords
MPCblockchainsfinalityforkssmart contracts
Contact author(s)
botta vin @ gmail com
friolo @ di uniroma1 it
venturi @ di uniroma1 it
ivan visconti @ gmail com
History
2021-05-10: last of 10 revisions
2019-08-05: received
See all versions
Short URL
https://ia.cr/2019/891
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/891,
      author = {Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti},
      title = {Shielded Computations in Smart Contracts Overcoming Forks},
      howpublished = {Cryptology ePrint Archive, Paper 2019/891},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/891}},
      url = {https://eprint.iacr.org/2019/891}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.