60
18

On the Security of Proofs of Sequential Work in a Post-Quantum World

Abstract

A proof of sequential work allows a prover to convince a resource-bounded verifier that the prover invested a substantial amount of sequential time to perform some underlying computation. Proofs of sequential work have many applications including time-stamping, blockchain design, and universally verifiable CPU benchmarks. Mahmoody, Moran, and Vadhan (ITCS 2013) gave the first construction of proofs of sequential work in the random oracle model though the construction relied on expensive depth-robust graphs. In a recent breakthrough, Cohen and Pietrzak (EUROCRYPT 2018) gave a more efficient construction that does not require depth-robust graphs. In each of these constructions, the prover commits to a labeling of a directed acyclic graph GG with NN nodes and the verifier audits the prover by checking that a small subset of labels are locally consistent, e.g., Lv=H(Lv1,,Lvδ)L_v = H(L_{v_1},\ldots,L_{v_\delta}), where v1,,vδv_1,\ldots,v_\delta denote the parents of node vv. Provided that the graph GG has certain structural properties (e.g., depth-robustness), the prover must produce a long H\mathcal{H}-sequence to pass the audit with non-negligible probability. An H\mathcal{H}-sequence x0,x1xTx_0,x_1\ldots x_T has the property that H(xi)H(x_i) is a substring of xi+1x_{i+1} for each ii, i.e., we can find strings ai,bia_i,b_i such that xi+1=aiH(xi)bix_{i+1} = a_i \cdot H(x_i) \cdot b_i. In the parallel random oracle model, it is straightforward to argue that any attacker running in sequential time T1T-1 will fail to produce an H\mathcal{H}-sequence of length TT except with negligible probability -- even if the attacker submits large batches of random oracle queries in each round. (See the paper for the full abstract.)

View on arXiv
Comments on this paper