YOSO: You Only Speak Once View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2021-08-11

AUTHORS

Craig Gentry , Shai Halevi , Hugo Krawczyk , Bernardo Magri , Jesper Buus Nielsen , Tal Rabin , Sophia Yakoubov

ABSTRACT

The inherent difficulty of maintaining stateful environments over long periods of time gave rise to the paradigm of serverless computing, where mostly stateless components are deployed on demand to handle computation tasks, and are torn down once their task is complete. Serverless architecture could offer the added benefit of improved resistance to targeted denial-of-service attacks, by hiding from the attacker the physical machines involved in the protocol until after they complete their work. Realizing such protection, however, requires that the protocol only uses stateless parties, where each party sends only one message and never needs to speaks again. Perhaps the most famous example of this style of protocols is the Nakamoto consensus protocol used in Bitcoin: A peer can win the right to produce the next block by running a local lottery (mining) while staying covert. Once the right has been won, it is executed by sending a single message. After that, the physical entity never needs to send more messages.We refer to this as the You-Only-Speak-Once (YOSO) property, and initiate the formal study of it within a new model that we call the YOSO model. Our model is centered around the notion of roles, which are stateless parties that can only send a single message. Crucially, our modelling separates the protocol design, that only uses roles, from the role-assignment mechanism, that assigns roles to actual physical entities. This separation enables studying these two aspects separately, and our YOSO model in this work only deals with the protocol-design aspect.We describe several techniques for achieving YOSO MPC; both computational and information theoretic. Our protocols are synchronous and provide guaranteed output delivery (which is important for application domains such as blockchains), assuming honest majority of roles in every time step. We describe a practically efficient computationally-secure protocol, as well as a proof-of-concept information theoretically secure protocol. More... »

PAGES

64-93

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-84245-1_3

DOI

http://dx.doi.org/10.1007/978-3-030-84245-1_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1140318657


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Algorand Foundation, New York, USA", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Algorand Foundation, New York, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gentry", 
        "givenName": "Craig", 
        "id": "sg:person.013505357721.13", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013505357721.13"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Algorand Foundation, New York, USA", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Algorand Foundation, New York, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Halevi", 
        "givenName": "Shai", 
        "id": "sg:person.015100320721.93", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015100320721.93"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Algorand Foundation, New York, USA", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Algorand Foundation, New York, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Krawczyk", 
        "givenName": "Hugo", 
        "id": "sg:person.013004021661.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.7048.b", 
          "name": [
            "Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Magri", 
        "givenName": "Bernardo", 
        "id": "sg:person.014747373210.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014747373210.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.7048.b", 
          "name": [
            "Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Nielsen", 
        "givenName": "Jesper Buus", 
        "id": "sg:person.07771244317.67", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07771244317.67"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "UPenn, Philadelphia, USA", 
          "id": "http://www.grid.ac/institutes/grid.25879.31", 
          "name": [
            "Algorand Foundation, New York, USA", 
            "UPenn, Philadelphia, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rabin", 
        "givenName": "Tal", 
        "id": "sg:person.015473523512.58", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Aarhus University, Aarhus, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.7048.b", 
          "name": [
            "Aarhus University, Aarhus, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yakoubov", 
        "givenName": "Sophia", 
        "id": "sg:person.011136335265.29", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136335265.29"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2021-08-11", 
    "datePublishedReg": "2021-08-11", 
    "description": "The inherent difficulty of maintaining stateful environments over long periods of time gave rise to the paradigm of serverless computing, where mostly stateless components are deployed on demand to handle computation tasks, and are torn down once their task is complete. Serverless architecture could offer the added benefit of improved resistance to targeted denial-of-service attacks, by hiding from the attacker the physical machines involved in the protocol until after they complete their work. Realizing such protection, however, requires that the protocol only uses stateless parties, where each party sends only one message and never needs to speaks again. Perhaps the most famous example of this style of protocols is the Nakamoto consensus protocol used in Bitcoin: A peer can win the right to produce the next block by running a local lottery (mining) while staying covert. Once the right has been won, it is executed by sending a single message. After that, the physical entity never needs to send more messages.We refer to this as the You-Only-Speak-Once (YOSO) property, and initiate the formal study of it within a new model that we call the YOSO model. Our model is centered around the notion of roles, which are stateless parties that can only send a single message. Crucially, our modelling separates the protocol design, that only uses roles, from the role-assignment mechanism, that assigns roles to actual physical entities. This separation enables studying these two aspects separately, and our YOSO model in this work only deals with the protocol-design aspect.We describe several techniques for achieving YOSO MPC; both computational and information theoretic. Our protocols are synchronous and provide guaranteed output delivery (which is important for application domains such as blockchains), assuming honest majority of roles in every time step. We describe a practically efficient computationally-secure protocol, as well as a proof-of-concept information theoretically secure protocol.", 
    "editor": [
      {
        "familyName": "Malkin", 
        "givenName": "Tal", 
        "type": "Person"
      }, 
      {
        "familyName": "Peikert", 
        "givenName": "Chris", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-84245-1_3", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-030-84244-4", 
        "978-3-030-84245-1"
      ], 
      "name": "Advances in Cryptology \u2013 CRYPTO 2021", 
      "type": "Book"
    }, 
    "keywords": [
      "single message", 
      "physical entities", 
      "role assignment mechanism", 
      "notion of role", 
      "Nakamoto consensus protocol", 
      "serverless computing", 
      "serverless architecture", 
      "service attacks", 
      "physical machines", 
      "stateless components", 
      "computation tasks", 
      "secure protocol", 
      "concept information", 
      "honest majority", 
      "information theoretic", 
      "protocol design", 
      "next block", 
      "consensus protocol", 
      "output delivery", 
      "more messages", 
      "messages", 
      "task", 
      "local lottery", 
      "computing", 
      "protocol", 
      "attacker", 
      "formal study", 
      "time step", 
      "inherent difficulties", 
      "architecture", 
      "machine", 
      "Bitcoin", 
      "denial", 
      "You", 
      "new model", 
      "theoretic", 
      "attacks", 
      "entities", 
      "parties", 
      "model", 
      "paradigm", 
      "famous example", 
      "information", 
      "work", 
      "peers", 
      "environment", 
      "proof", 
      "aspects", 
      "design", 
      "technique", 
      "demand", 
      "example", 
      "block", 
      "MPC", 
      "such protection", 
      "step", 
      "notion", 
      "style", 
      "difficulties", 
      "benefits", 
      "time", 
      "components", 
      "protection", 
      "delivery", 
      "long period", 
      "mechanism", 
      "separates", 
      "rights", 
      "role", 
      "rise", 
      "properties", 
      "study", 
      "majority", 
      "lottery", 
      "separation", 
      "period", 
      "resistance"
    ], 
    "name": "YOSO: You Only Speak Once", 
    "pagination": "64-93", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1140318657"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-84245-1_3"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-84245-1_3", 
      "https://app.dimensions.ai/details/publication/pub.1140318657"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:44", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_231.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-84245-1_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-84245-1_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-84245-1_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-84245-1_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-84245-1_3'


 

This table displays all metadata directly associated to this object as RDF triples.

193 TRIPLES      23 PREDICATES      102 URIs      95 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-84245-1_3 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Nafb924768a86453ca35de177d5f40200
4 schema:datePublished 2021-08-11
5 schema:datePublishedReg 2021-08-11
6 schema:description The inherent difficulty of maintaining stateful environments over long periods of time gave rise to the paradigm of serverless computing, where mostly stateless components are deployed on demand to handle computation tasks, and are torn down once their task is complete. Serverless architecture could offer the added benefit of improved resistance to targeted denial-of-service attacks, by hiding from the attacker the physical machines involved in the protocol until after they complete their work. Realizing such protection, however, requires that the protocol only uses stateless parties, where each party sends only one message and never needs to speaks again. Perhaps the most famous example of this style of protocols is the Nakamoto consensus protocol used in Bitcoin: A peer can win the right to produce the next block by running a local lottery (mining) while staying covert. Once the right has been won, it is executed by sending a single message. After that, the physical entity never needs to send more messages.We refer to this as the You-Only-Speak-Once (YOSO) property, and initiate the formal study of it within a new model that we call the YOSO model. Our model is centered around the notion of roles, which are stateless parties that can only send a single message. Crucially, our modelling separates the protocol design, that only uses roles, from the role-assignment mechanism, that assigns roles to actual physical entities. This separation enables studying these two aspects separately, and our YOSO model in this work only deals with the protocol-design aspect.We describe several techniques for achieving YOSO MPC; both computational and information theoretic. Our protocols are synchronous and provide guaranteed output delivery (which is important for application domains such as blockchains), assuming honest majority of roles in every time step. We describe a practically efficient computationally-secure protocol, as well as a proof-of-concept information theoretically secure protocol.
7 schema:editor Na18e2c96386f4a569daecef441d066c1
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Na442ce7e41654559a21258b5f146ed98
12 schema:keywords Bitcoin
13 MPC
14 Nakamoto consensus protocol
15 You
16 architecture
17 aspects
18 attacker
19 attacks
20 benefits
21 block
22 components
23 computation tasks
24 computing
25 concept information
26 consensus protocol
27 delivery
28 demand
29 denial
30 design
31 difficulties
32 entities
33 environment
34 example
35 famous example
36 formal study
37 honest majority
38 information
39 information theoretic
40 inherent difficulties
41 local lottery
42 long period
43 lottery
44 machine
45 majority
46 mechanism
47 messages
48 model
49 more messages
50 new model
51 next block
52 notion
53 notion of role
54 output delivery
55 paradigm
56 parties
57 peers
58 period
59 physical entities
60 physical machines
61 proof
62 properties
63 protection
64 protocol
65 protocol design
66 resistance
67 rights
68 rise
69 role
70 role assignment mechanism
71 secure protocol
72 separates
73 separation
74 serverless architecture
75 serverless computing
76 service attacks
77 single message
78 stateless components
79 step
80 study
81 style
82 such protection
83 task
84 technique
85 theoretic
86 time
87 time step
88 work
89 schema:name YOSO: You Only Speak Once
90 schema:pagination 64-93
91 schema:productId N9c89697776e24d7094d23d5a6e4fbfc8
92 Nef108eeafc94443689adb28bb93fd0d8
93 schema:publisher Nd8c4351aaedc4cb89abd5f707531bd78
94 schema:sameAs https://app.dimensions.ai/details/publication/pub.1140318657
95 https://doi.org/10.1007/978-3-030-84245-1_3
96 schema:sdDatePublished 2022-05-20T07:44
97 schema:sdLicense https://scigraph.springernature.com/explorer/license/
98 schema:sdPublisher N05d8fcf628a54ba7b0530ea1e6bf6897
99 schema:url https://doi.org/10.1007/978-3-030-84245-1_3
100 sgo:license sg:explorer/license/
101 sgo:sdDataset chapters
102 rdf:type schema:Chapter
103 N05d8fcf628a54ba7b0530ea1e6bf6897 schema:name Springer Nature - SN SciGraph project
104 rdf:type schema:Organization
105 N308f83f2895f4d13a921e0c61e91aa21 rdf:first sg:person.013004021661.30
106 rdf:rest N355b546481dd4e77b71d15f9aa23be98
107 N355b546481dd4e77b71d15f9aa23be98 rdf:first sg:person.014747373210.53
108 rdf:rest N58d011cfef2b439fbbd74054de161e85
109 N398856c2039742ca867acfa205d9be04 rdf:first sg:person.015100320721.93
110 rdf:rest N308f83f2895f4d13a921e0c61e91aa21
111 N58a9aec278a64012bede5ec0bd5ddfac rdf:first N9d91133ec80a444793dd230bdc0cbb88
112 rdf:rest rdf:nil
113 N58d011cfef2b439fbbd74054de161e85 rdf:first sg:person.07771244317.67
114 rdf:rest N92b0381d024f4dbda9c7ec13a2438377
115 N92b0381d024f4dbda9c7ec13a2438377 rdf:first sg:person.015473523512.58
116 rdf:rest N9864fb9802f84d24a217ba05260706ee
117 N9864fb9802f84d24a217ba05260706ee rdf:first sg:person.011136335265.29
118 rdf:rest rdf:nil
119 N9c89697776e24d7094d23d5a6e4fbfc8 schema:name doi
120 schema:value 10.1007/978-3-030-84245-1_3
121 rdf:type schema:PropertyValue
122 N9d91133ec80a444793dd230bdc0cbb88 schema:familyName Peikert
123 schema:givenName Chris
124 rdf:type schema:Person
125 Na18e2c96386f4a569daecef441d066c1 rdf:first Nf4258be8fe324888816c58ef8bf6de7f
126 rdf:rest N58a9aec278a64012bede5ec0bd5ddfac
127 Na442ce7e41654559a21258b5f146ed98 schema:isbn 978-3-030-84244-4
128 978-3-030-84245-1
129 schema:name Advances in Cryptology – CRYPTO 2021
130 rdf:type schema:Book
131 Nafb924768a86453ca35de177d5f40200 rdf:first sg:person.013505357721.13
132 rdf:rest N398856c2039742ca867acfa205d9be04
133 Nd8c4351aaedc4cb89abd5f707531bd78 schema:name Springer Nature
134 rdf:type schema:Organisation
135 Nef108eeafc94443689adb28bb93fd0d8 schema:name dimensions_id
136 schema:value pub.1140318657
137 rdf:type schema:PropertyValue
138 Nf4258be8fe324888816c58ef8bf6de7f schema:familyName Malkin
139 schema:givenName Tal
140 rdf:type schema:Person
141 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
142 schema:name Information and Computing Sciences
143 rdf:type schema:DefinedTerm
144 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
145 schema:name Computation Theory and Mathematics
146 rdf:type schema:DefinedTerm
147 sg:person.011136335265.29 schema:affiliation grid-institutes:grid.7048.b
148 schema:familyName Yakoubov
149 schema:givenName Sophia
150 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136335265.29
151 rdf:type schema:Person
152 sg:person.013004021661.30 schema:affiliation grid-institutes:None
153 schema:familyName Krawczyk
154 schema:givenName Hugo
155 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30
156 rdf:type schema:Person
157 sg:person.013505357721.13 schema:affiliation grid-institutes:None
158 schema:familyName Gentry
159 schema:givenName Craig
160 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013505357721.13
161 rdf:type schema:Person
162 sg:person.014747373210.53 schema:affiliation grid-institutes:grid.7048.b
163 schema:familyName Magri
164 schema:givenName Bernardo
165 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014747373210.53
166 rdf:type schema:Person
167 sg:person.015100320721.93 schema:affiliation grid-institutes:None
168 schema:familyName Halevi
169 schema:givenName Shai
170 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015100320721.93
171 rdf:type schema:Person
172 sg:person.015473523512.58 schema:affiliation grid-institutes:grid.25879.31
173 schema:familyName Rabin
174 schema:givenName Tal
175 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58
176 rdf:type schema:Person
177 sg:person.07771244317.67 schema:affiliation grid-institutes:grid.7048.b
178 schema:familyName Nielsen
179 schema:givenName Jesper Buus
180 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07771244317.67
181 rdf:type schema:Person
182 grid-institutes:None schema:alternateName Algorand Foundation, New York, USA
183 schema:name Algorand Foundation, New York, USA
184 rdf:type schema:Organization
185 grid-institutes:grid.25879.31 schema:alternateName UPenn, Philadelphia, USA
186 schema:name Algorand Foundation, New York, USA
187 UPenn, Philadelphia, USA
188 rdf:type schema:Organization
189 grid-institutes:grid.7048.b schema:alternateName Aarhus University, Aarhus, Denmark
190 Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark
191 schema:name Aarhus University, Aarhus, Denmark
192 Concordium Blockchain Research Center, Aarhus University, Aarhus, Denmark
193 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...