Asynchronous Consensus Without Trusted Setup or Public-Key Cryptography
Researchers propose an Asynchronous Common Subset (ACS) protocol for Byzantine consensus without trusted setup or public-key cryptography. The protocol uses hash functions, offers post-quantum security, and introduces new primitives. Efficiently evaluated in a geo-distributed setting.
Read original articleThe paper titled "Asynchronous Consensus without Trusted Setup or Public-Key Cryptography" by a team of researchers introduces an Asynchronous Common Subset (ACS) protocol for Byzantine consensus that does not require a trusted setup or public-key cryptography. The protocol relies on cryptographic hash functions and is post-quantum secure, with efficient communication and expected round complexity. The researchers also present new primitives like asynchronous secret key sharing and cover gather. Experimental evaluation on up to 128 machines in a geo-distributed setting demonstrates the protocol's efficiency compared to existing setup-free consensus protocols. The paper is available as a preprint in PDF format on the Cryptology ePrint Archive, with contact information for the authors provided for further inquiries.
Related
Algorithmic fitting of Japanese candy
The article discusses algorithmically fitting Japanese candies into a subscription box for Candy Japan. The programmer developed an algorithm considering candy sizes, permutations, and NP-hard complexity. Despite challenges, the project led to discontinuing Candy Japan due to postal rate impacts.
MeshAnything – Converts 3D representations into efficient 3D meshes
MeshAnything efficiently generates high-quality Artist-Created Meshes with optimized topology, fewer faces, and precise shapes. Its innovative approach enhances 3D industry applications by improving storage and rendering efficiencies.
Show HN: Eidos – Offline alternative to Notion
The Eidos project on GitHub offers a personal data management framework as a Progressive Web App with AI features. Customizable with extensions and scripting, it leverages sqlite-wasm technology for chromium-based browsers.
Andrew S. Tanenbaum Receives ACM Software System Award
Andrew S. Tanenbaum, known for MINIX, receives ACM Software System Award for shaping OS education and influencing Linux's design. His microkernel work continues to impact OS development globally.
New JavaScript Set Methods
New JavaScript Set methods introduced in major browsers like Firefox 127 offer efficient set operations without polyfills. These methods simplify tasks like finding intersections, unions, and subsets, enhancing working with unique collections.
1) Already have a leader "Dealer"
2) The leader builds a K-of-N set of shared secret keys.
3) They publish a mapping of each participant (participant_i->hash(secret_i))
4) The leader transmits each key to each participant
5) Participants exchange secrets pairwise, armed with the upfront mapping of participants->secrets
6) Select K and a k-of-N secret scheme such that a majority of participants now have a shared key
lots of the claims aren't meaningful:
- "post quantum" for example isn't a special value in this situation.
- "minimal use of cryptography" isn't relevant to practicality
- The "experimental" component doesn't meaningful contribute to the conclusion.
- No public-key-encryption really means "outsource sender identification to the network layer"
- They pretend using a system of equations to solve for a shared key isn't"cryptography".
In general the contribution of the paper reads as "offusicated". The lack of "public key cryptography" sets them up for a novel problem to solve, but it is an arbitrary handicap that doesn't provide utility.
This is academic "make up a novel and nontrivial problem and then solve it", its of utility to the process of producing grad students and publication count but not something we need to get excited about. Read it like a survey paper of the space, which it does well as.
That said, my very uneducated guess is that the problem being solved here is not important for many users of distributed consensus algorithms. If you have a bunch of nodes that need to agree on something, you generally don't mind sharing a cryptographic secret among them as part of the set-up.
All such protocols, even Bitcoin and friends, break under a sufficiently costly Sybil attack. The trick with cryptocurrency is to make the attack so expensive that it requires a highly economically irrational actor.
What are the thresholds here?
Is there a multiple signature method that isn't "just" signing other people's signatures?
Edit: Adding this as a PSA in case folks start debating the veracity assuming this has undergone review by experts.
*Edit: As other have pointed out, for SPHINCS+ it's the signature size and not the key size that's significantly larger.
Related
Algorithmic fitting of Japanese candy
The article discusses algorithmically fitting Japanese candies into a subscription box for Candy Japan. The programmer developed an algorithm considering candy sizes, permutations, and NP-hard complexity. Despite challenges, the project led to discontinuing Candy Japan due to postal rate impacts.
MeshAnything – Converts 3D representations into efficient 3D meshes
MeshAnything efficiently generates high-quality Artist-Created Meshes with optimized topology, fewer faces, and precise shapes. Its innovative approach enhances 3D industry applications by improving storage and rendering efficiencies.
Show HN: Eidos – Offline alternative to Notion
The Eidos project on GitHub offers a personal data management framework as a Progressive Web App with AI features. Customizable with extensions and scripting, it leverages sqlite-wasm technology for chromium-based browsers.
Andrew S. Tanenbaum Receives ACM Software System Award
Andrew S. Tanenbaum, known for MINIX, receives ACM Software System Award for shaping OS education and influencing Linux's design. His microkernel work continues to impact OS development globally.
New JavaScript Set Methods
New JavaScript Set methods introduced in major browsers like Firefox 127 offer efficient set operations without polyfills. These methods simplify tasks like finding intersections, unions, and subsets, enhancing working with unique collections.