Welcome to the resource topic for 2024/285
Title:
Mirrored Commitment: Fixing ``Randomized Partial Checking’’ and Applications
Authors: Paweł Lorek, Moti Yung, Filip Zagórski
Abstract:Randomized Partial Checking (RPC} was proposed by Jakobsson, Juels, and Rivest and attracted attention as an efficient method of verifying the correctness of the mixing process in numerous applied scenarios. In fact,
RPC is a building block for many electronic voting schemes, including Prêt à Voter, Civitas, Scantegrity II as well as voting-systems used in real-world elections (e.g., in Australia). Mixing is also used in anonymous transfers of cryptocurrencies.
It turned out, however, that a series of works showed, however,
subtle issues with analyses behind RPC. First, that the actual
security level of the RPC protocol is way off the claimed bounds. The probability of successful manipulation of k votes is (\frac{3}{4})^k instead of the claimed \frac{1}{2^k} (this difference, in turn, negatively affects actual implementations of the notion within existing election systems. This is so since concrete implemented procedures of a given length were directly based on this parameter).
Further, privacy guarantees that a constant number of mix-servers is enough turned out to also not be correct. We can conclude from the above that these analyses of the processes of mixing are not trivial.
In this paper, we review the relevant attacks, and we present Mirrored-RPC – a fix to RPC based on ``mirrored commitment’’ which makes it optimally secure; namely, having a probability of successful manipulation of k votes \frac{1}{2^k}.
Then, we present an analysis of the privacy level of both RPC and mRPC. We show that for n messages, the number of mix-servers (rounds) needed to be \varepsilon-close to the uniform distribution in total variation distance is lower bounded by:
[
r(n, \varepsilon) \geq \log_{2}{n \choose 2}/\varepsilon.
]
This proof of privacy, in turn, gives insights into the anonymity of various cryptocurrencies (e.g., Zerocash) using anonymizing pools. If a random fraction q of n existing coins is mixed (in each block), then to achieve full anonymity, the number of blocks one needs to run the protocol for, is:
[
rb(n, q, \varepsilon) \geq - \frac{\log n + \log (n-1) - \log (2\varepsilon)}{ {\log({1-q^2}})}.
]
ePrint: https://eprint.iacr.org/2024/285
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .