Your locale preferences have been saved. We like to think that we have excellent support for English in pretalx, but if you encounter issues or errors, please contact us!

Cryptography of Killing Proof-of-Work [YBTI/wefixthenet session]
2019-12-30, 12:00–12:30 (Europe/Berlin), OIO Stage
Language: English

We briefly discuss the range of cryptographic primitives being used by protocols that seek to make proof-of-work protocols obsolete. We shall focus primarily on these cryptographic building blocks themselves, not overly on the different protocols built form them.


There are a handful of protocols consuming enormous amounts of energy in proof-of-work schemes, which provide only rather tenuous security assurances. In practice, proof-of-work also invalidates these protocols original goal of being distributed.

There is also a zoo of protocols designs, both new and from the 80s, that provide far stronger security than proof-of-work at minimal cost. We shall discuss the distinctive cryptographic primitives used by these protocols, without examining any of these critters too closely.

In essence, our taxonomy splits as blind signatures vs. verifiable random functions (VRFs) vs. randomness beacons, with the latter consisting of publicly verifiable secret sharing (PVSS) and verifiable delay functions (VDFs). We only have time for a cursory look at the mathematics usable to build each of these, but this should explain some of their uses, strengths, and weaknesses.

dvn

p2p communications and privacy researcher and developer

Currently organizing a "youbroketheinternet/wefixthenet" session at 36c3, representing GNUnet.

This speaker also appears in:

Jeff Burdges is an applied cryptography researcher working with the Web3 foundation, where he works on cryptography for decentralized and/or privacy preserving protocols.

Jeff's work often involves collaborative randomness, specialized signature schemes like verifiable random functions (VRFs) or anonymous credentials, and increasingly both zero-knowledge proofs and incentives or mechanism design using VRFs. Jeff is also researching a peer-to-peer private messaging service that will use mix networks.

Jeff previously worked on Taler and GNUNet as a postdoc for Christian Grothoff at Inria, Rennes, where he worked on anonymity protocols primarily mix networks, blind signatures, security proofs, distributed authentication, forward-secure ratchets, and pairing-based protocols. Jeff holds a PhD degree in Mathematics from Rutgers University in New Jersey.