International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials

Authors:
Nico Döttling , CISPA Helmholtz Center for Information Security
Jesko Dujmovic , CISPA Helmholtz Center for Information Security
Antoine Joux , CISPA Helmholtz Center for Information Security
Download:
Search ePrint
Search Google
Conference: TCC 2024
Abstract: Timed cryptography has initiated a paradigm shift in the design of cryptographic protocols: Using timed cryptography we can realize tasks \emph{fairly}, which is provably out of range of standard cryptographic concepts. To a certain degree, the success of timed cryptography is rooted in the existence of efficient protocols base on the \emph{sequential squaring assumption}. In this work, we consider space analogues of timed cryptographic primitives, which we refer to as \emph{space-hard} primitives. Roughly speaking, these notions require honest protocol parties to invest a certain amount of space and provide security against space constrained adversaries. While inefficient generic constructions of timed-primitives from strong assumptions such as indistinguishability obfuscation can be adapted to the space-hard setting, we currently lack concrete and versatile assumptions for space-hard cryptography. In this work, we initiate the study of space-hard primitives from concrete algebraic assumptions relating to the problem of root-finding of sparse polynomials. Our motivation to study this problem is a candidate construction of VDFs by Boneh et al. (CRYPTO 2018) which are based on the hardness of inverting permutation polynomials. Somewhat anticlimactically, our first contribution is a full break of this candidate. However, we then revise this hardness assumption by dropping the permutation requirement and considering arbitrary sparse high degree polynomials. We argue that this type of assumption is much better suited for space-hardness rather than timed cryptography. We then proceed to construct both space-lock puzzles and verifiable space-hard functions from this assumption.
BibTeX
@inproceedings{tcc-2024-34734,
  title={Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials},
  publisher={Springer-Verlag},
  author={Nico Döttling and Jesko Dujmovic and Antoine Joux},
  year=2024
}