Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption
- 1.4k Downloads
Public Blockchains on their own are, by definition, incapable of keeping data private and disclosing it at a later time. Control over the eventual disclosure of private data must be maintained outside a Blockchain by withholding and later publishing encryption keys, for example. We propose the Atomic Information Disclosure (AID) pattern based on threshold encryption that allows a set of key holders to govern the release of data without having access to it. We motivate this pattern with problems that require independently reproduced solutions. By keeping submissions private until a deadline expires, participants are unable to plagiarise and must therefore generate their own solutions which can then be aggregated and analysed to determine a final answer. We outline the importance of a game-theoretically sound incentive scheme, possible attacks, and other future work.
KeywordsConsensus Off-chain construction Atomic disclosure
This work was supported by the German Federal Ministry of Education and Research within the framework of the project KASTEL_ISE in the Competence Center for Applied Security Technology (KASTEL).
We would like to thank the anonymous reviewers for their feedback, especially for bringing the work by Kokoris-Kogias et al.  to our attention.
- 2.Bartolucci, S., Bernat, P., Joseph, D.: SHARVOT: secret SHARe-based VOTing on the blockchain. arXiv.org, March 2018
- 3.Benet, J.: IPFS - Content Addressed, Versioned, P2P File System. arXiv.org, July 2014
- 5.Buterin, V.: A next-generation smart contract and decentralized application platform. White paper (2014)Google Scholar
- 8.Desmedt, Y.: Threshold cryptosystems (1993)Google Scholar
- 10.Kokoris-Kogias, E., et al.: Hidden in plain sight - storing and managing secrets on a public ledger. IACR Cryptology ePrint Archive (2018)Google Scholar
- 11.Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: The 22nd ACM SIGSAC Conference, pp. 706–719. ACM Press, New York (2015)Google Scholar
- 12.Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. bitcoin.org (2008)
- 14.Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997)Google Scholar
- 15.Teutsch, J., Reitweißner, C.: A scalable verification solution for blockchains. people.cs.uchicago.edu, March 2017
- 17.Wheeler, D.: Countering trusting trust through diverse double-compiling. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), pp. 33–48. IEEE (2005)Google Scholar