Documente Academic
Documente Profesional
Documente Cultură
Economics Send a payment for future services rendered; estate planning Securely preserve bid identify until auction ends
General
Millionaire Problem
EXP Time Complexity Explanation. Two millionaires can decide who is richer, without revealing their net worth thats multi-party computation (MPC). More details. Its quite complex: basically, you just have to establish the inequality I J, where I,J are fortunes of participants, not actually reveal amounts. That doesnt explain much A sends B random-looking m, but is actually encrypted, storing As secret x. B decrypts m, getting many Y. Any one of Y could be x, but after reducing Ys to the modulus prime, B selectively decrypts based on her wealth.
Who do you share the treasure map with? If you want your secret to outlive you, you need a trusted source (or heir, etc.).
Protection against the elements. The longevity of the protection scheme is a function of the environment: obviously, a cleanroom with round-the-clock armed guards would be ideal, but highly-impractical
1. Initialization
2. Encryption
3. Time Delay
4. Decryption
Compose message
Generate cipher-text
Production
Selection
Consideration
Consumption
Publish message
Specify deployment
Apply protection
Ensure delivery
Decryption key must remain unknowable until the specified document/ message deployment time Must be possible to strongly verify authenticity and integrity of the message.
Cannot deny the contents once information sent through the encrypted message protocol NP-hard problems will remain computationally intractable on the order of centuries For any network system, malicious adversaries will never control >50% of the nodes
Computational Equivalence
ry DE_draftv13_070430.ppt
p, q
N = pq
This is the public key: people who want to send AMZN a secret (e.g. their payment information), use this key to encode their information
This is what you send back (your credit card = x) For 10,000-digit long :
3k = 1mod( p ! 1)(q ! 1)
x 3 mod N
10
6
Years required to compute roots of modulus N without p,q
p, q
Current public-key encryption protocols are sufcient to complement any TCP/IPbased proposal presented
Idea
Details
2 mod n
Which can only be solved by t squarings modulus n per second
2t
If an equation can be solved either only P or Alice () wants to send message, M, with a several NP ways, classical computers opt for time delay of T seconds for decryption the polynomial-time method, no matter the (n, a, t , CK , C M ) i n e f c i e n c y, t o r e a l i ze s o l u t i o n s i n Step 6 2t C = K + a (mod n ) reasonable time. K
C M = RC 5( K , M )
K
n = pq Step 2 ! (n ) = ( p " 1)(q " 1) calculates t;
generates random K, typically S = number of must be squarings >160bits to modulo n per guarantee second security
t = TS
Step 3
produces output in the selects form of a timerandom a lock puzzle, (mod n), discarding any where (1 < a < other n) and intermediate encrypts K as variables CK. [e, b are for conv.] e = 2 t (mod ! (n )) Step 5
b = a e (mod n )
b = a (mod n )
This implies that b is computed via:
2t
Initial Considerations
b = a e (mod n )
there appears to be no faster way to compute b than to start with a and perform t squarings sequentially (as you must square the previous amount Repeated squaring is an intrinsically sequential computational process, and parallelizability algorithms are not evident for this particular case.
Computing n from (n) is provably hard, so once discards p,q, there is no avoiding the perception that that
Manipulability
Hence, the number t of squarings required to solve a particular instantiation of the puzzle can be precisely controlled
Under what computing conditions or problems can we agree with condence on the equality existing between the two quantities?
Possible Rectiers
Adversarial Botnet Swarms Assume that many, many more computers recruited to enhance negative objective, but ONLY brute force attacks possible: Compromised PK Production Malicious adversaries may conate users legal actions with commercially questionable tactics, reducing effectiveness Premature Reassembly of DK Stochastic Stimuli
One-way function that is extremely, extremely sequential (no parallelizability); hence innite resource scaling would not enhance time resolution for adversaries
N secure buckets, where s buckets are secure vaults and f buckets are furnaces (permanent le deletion protocols)
Just as Julian Assange/ Wikileaks released a 1.45GB AES-256-encrypted insurance le over BitTorrent, the encryption key should be subject to maximum Decentralized Distribution economic protection
Optimized bucketing
Translates to less collisions for bins with high incoming inventory velocity
Protocol II: Firing Squads & Polynomials: How do you share a secret?
Snapshot Situation: Time-delay Complication: Synchronization Question: NTP-independent? Dividing the message Proposal Cut the secret message in N strips. Distribute across network randomly. Base network protocol on ring squad synchronization problem (FSSP) solutions to ensure message is guaranteed simultaneous transmission. Example calculation Let secret, S, be 1371 (1) We have n=6 friends willing to keep a piece of our secret, but want to ensure only k=3 pieces necessary for reconstruction. (2) Choose k-1=2 random coefcients to construct: Synchronization rules FSSP Solutions as Protocol We can learn a lot from the problem ofcers face when trying get all the soldiers in the execution squad to re at the same time Recovering original
Polynomial Multiplication
Harvest 3 pairs from your group of friends, and compute the Lagrange basis polynomials:
Abstraction
Signal Speed: /3
(4) Distribute amongst your friends the 6 pairs (5) Designate a rally point after time t elapse (6) Note: if you have n nodes and you want to guarantee that only k many nodes are sufcient to recover the message, then true security means distributing only k-1 pieces of info Now, multiply each of the basis polynomials by the f(x) at that point:
x t
Continued
3rd
4th
5th
Network
Node/server grabs data pushed from managerial layer (privileged metanodes) Provide task handling for project and load balancing for compromised nodes
Linked hash addresses to maintain a block chain of validity (hashing password caches, etc.) Decryption Key Deployment Date Original Shot
Public Key
PK
DK
T+
Exotica: Ideas meriting consideration whence traditional protocols fail Transmission to space. Exploit the nite speed of light and the astronomical distances of cosmic objects to guarantee some minimum amount of time the message (presumably, an encoding onto some coherent states prepared in a laboratory) is out of reach from terrestrial adversaries. Quantum time-bomb [Wolfram/Puniani]. Suppose we bury a quantum device in several sites around the world (presumably, around or in what you expect to be or already have been declared cultural landmarks and monuments) with a known, semi-controllable diffusion emission rate. The information bubbling up would probably recruit a type of Dirichlet tesselation, in which a message is realized once all the shards close the gaps. Biological timed-safe. Venous stasis, an accumulation of uids in poorlycirculating regions in the body, tends to intensify pigmentation. Tissues ll with uids from broken and leaky vessels, and the iron from released hemoglobin eventually stains the skin. Imagine if you could precisely tune the staining pattern to produce an imprint (tattoo) with the secret message at a specied time.
Appendix
ry DE_draftv13_070430.ppt
Message Preparation
Encrypt Message (via RSA, ElGamal, etc.) Deploy Decryption Script, which explicates checkpoints
Final State
Proof-of-work. Have a
trusted network of nodes verify that a certain number of well-characterized computational cycles were burned in order to advance through the script
Problem n
Problem 1
Problem 2
RNG
K S1
K S1
...
K Sm
K Sm
K Um K UR
KSK
EM
...
...
REM
ry DE_draftv13_070430.ppt