Fair Two-Party Computations via Bitcoin Deposits
@article{Andrychowicz2014FairTC, title={Fair Two-Party Computations via Bitcoin Deposits}, author={Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Lukasz Mazurek}, journal={IACR Cryptol. ePrint Arch.}, year={2014}, volume={2013}, pages={837} }
We show how the Bitcoin currency system (with a small modification) can be used to obtain fairness in any two-party secure computation protocol in the following sense: if one party aborts the protocol after learning the output then the other party gets a financial compensation (in bitcoins). One possible application of such protocols is the fair contract signing: each party is forced to complete the protocol, or to pay to the other one a fine.
143 Citations
How to Use Bitcoin to Design Fair Protocols
- Computer Science, MathematicsCRYPTO
- 2014
It is shown how the Bitcoin network can be used to achieve the above notion of fairness in the two-party as well as the multiparty setting (with a dishonest majority) in this model of fairness.
How to deal with malleability of BitCoin transactions
- Mathematics, Computer ScienceArXiv
- 2013
This short note shows a general technique for creating malleability-resilient "refund" transactions, which does not require any modification of the BitCoin protocol.
Constant-Deposit Multiparty Lotteries on Bitcoin
- Computer Science, MathematicsFinancial Cryptography Workshops
- 2017
This work proposes a fair lottery on Bitcoin which only requires a constant deposit which grows quadratically with the number of players.
A Denial of Service attack against fair computations using Bitcoin deposits
- Computer Science, MathematicsInf. Process. Lett.
- 2016
Zero-Collateral Lotteries in Bitcoin and Ethereum
- Computer Science, Mathematics2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
- 2017
These protocols are based on a tournament bracket construction, and require only O(logN) rounds, and represent a significant improvement, both because they allow players with little money to participate, and because of the time value of money.
Secure Multiparty Computations on Bitcoin
- Computer Science, Mathematics2014 IEEE Symposium on Security and Privacy
- 2014
The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions.
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin
- Computer Science, MathematicsFinancial Cryptography
- 2017
This work formalizes the escrow problem and presents a suite of schemes with improved security and privacy properties that are compatible with Bitcoin and similar blockchain-based cryptocurrencies.
How to Use Bitcoin to Incentivize Correct Computations
- Computer Science, MathematicsCCS
- 2014
An efficient secure computation protocol is shown that monetarily penalizes an adversary that attempts to learn one bit of information but gets detected in the process and captures the amount of computational effort required to validate Bitcoin transactions required to implement it in Bitcoin.
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
- Computer Science, MathematicsESORICS
- 2016
Although smart contracts are believed to have a huge potential, for the moment they are not widely used in practice, because most of Bitcoin miners allow only to post standard transactions on the blockchain, it is currently very hard to create non-trivial smart contracts in Bitcoin.
Instantaneous Decentralized Poker
- Computer Science, MathematicsASIACRYPT
- 2017
Efficient protocols for amortized secure multiparty computation with penalties and secure cash distribution for poker, of which poker is a prime example, are presented.
References
SHOWING 1-10 OF 43 REFERENCES
Note on fair coin toss via Bitcoin
- MathematicsArXiv
- 2014
In this short note we show that the Bitcoin network can allow remote parties to gamble with their bitcoins by tossing a fair or biased coin, with no need for a trusted party, and without the…
How to deal with malleability of BitCoin transactions
- Mathematics, Computer ScienceArXiv
- 2013
This short note shows a general technique for creating malleability-resilient "refund" transactions, which does not require any modification of the BitCoin protocol.
Fair Secure Two-Party Computation
- Computer Science, MathematicsEUROCRYPT
- 2003
We demonstrate a transformation of Yao's protocol for secure two-party computation to a fair protocol in which neither party gains any substantial advantage by terminating the protocol prematurely.…
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
- Computer Science, Mathematics2013 IEEE Symposium on Security and Privacy
- 2013
Zerocoin is proposed, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions and uses standard cryptographic assumptions and does not introduce new trusted parties or otherwise change the security model of Bitcoin.
A fair protocol for signing contracts
- Computer ScienceIEEE Trans. Inf. Theory
- 1990
A new protocol is proposed that is fair in the sense that, at any stage in its execution, the conditional probability that one party cannot commit both parties to the contract given that the other party can, is close to zero.
Timed Commitments
- Computer ScienceCRYPTO
- 2000
We introduce and construct timed commitment schemes, an extension to the standard notion of commitments in which a potential forced opening phase permits the receiver to recover (with effort) the…
A fair non-repudiation protocol
- Computer ScienceProceedings 1996 IEEE Symposium on Security and Privacy
- 1996
This work presents a fair non-repudiation protocol that requires a trusted third party but attempts to minimize its involvement in the execution of the protocol.
Bitter to Better - How to Make Bitcoin a Better Currency
- Computer Science, MathematicsFinancial Cryptography
- 2012
An in-depth investigation is performed to understand what made Bitcoin so successful, while decades of research on cryptographic e-cash has not lead to a large-scale deployment.
Complete Fairness in Secure Two-Party Computation
- Computer Science, MathematicsJACM
- 2011
This paper shows feasibility of obtaining complete fairness when computing any function over polynomial-size domains that does not contain an “embedded XOR” and proves a lower bound showing that any completely fair protocol for such functions must have round complexity super-logarithmic in the security parameter.
CommitCoin: Carbon Dating Commitments with Bitcoin
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2011
In the standard definition of a commitment scheme, the sender commits to a message and immediately sends the commitment to the recipient interested in it. However the sender may not always know at…