Compact Multiparty Verification of Simple Computations

We present a compact model for blind multiparty verification of compilation results. By employing a simple incentive scheme, we construct a mechanism, staking a deposit value on the correctness of compiled and deployed byte code. A blind committee of peers evaluate the authenticity of the deployed byte code by re-computing the task, hashing the source and target code into checksums, and submitting bids to the contract. If the evaluation round reveals inconsistencies in the checksums provided by the peers, the contract can be rejected and the deposit shared amongst contenders.

[1]  Steven Homer,et al.  Interactive Proof Systems , 2011 .

[2]  Andrew J. Blumberg,et al.  Verifying computations without reexecuting them , 2015, Commun. ACM.

[3]  Srinath T. V. Setty,et al.  Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.

[4]  Ignacio Cascudo,et al.  SCRAPE: Scalable Randomness Attested by Public Entities , 2017, IACR Cryptol. ePrint Arch..

[5]  Nikhil Swamy,et al.  Formal Verification of Smart Contracts: Short Paper , 2016, PLAS@CCS.

[6]  Jason Teutsch,et al.  A scalable verification solution for blockchains , 2019, ArXiv.

[7]  Yael Tauman Kalai,et al.  Delegating computation: interactive proofs for muggles , 2008, STOC.

[8]  Florian Glaser,et al.  Pervasive Decentralisation of Digital Infrastructures: A Framework for Blockchain enabled System and Use Case Analysis , 2017, HICSS.

[9]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[10]  Abhi Shelat,et al.  Full Accounting for Verifiable Outsourcing , 2017, CCS.

[11]  Kyriakos Mouratidis,et al.  Scalable Verification for Outsourced Dynamic Databases , 2009, Proc. VLDB Endow..

[12]  Benjamin Braun,et al.  Verifying computations with state , 2013, IACR Cryptol. ePrint Arch..

[13]  Martin Elsman,et al.  Certified Compilation of Financial Contracts , 2018, PPDP.

[14]  Massimo Bartoletti,et al.  A Survey of Attacks on Ethereum Smart Contracts (SoK) , 2017, POST.

[15]  Roberto J. Bayardo,et al.  Merkle tree authentication of HTTP responses , 2005, WWW '05.

[16]  Oded Goldreich,et al.  Probabilistic Proof Systems: A Primer , 2008, Found. Trends Theor. Comput. Sci..

[17]  Alistair A. Young,et al.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 2017, MICCAI 2017.

[18]  Silvio Micali,et al.  CS Proofs (Extended Abstracts) , 1994, FOCS 1994.

[19]  Elaine Shi,et al.  Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.

[20]  Benjamin Braun,et al.  Resolving the conflict between generality and plausibility in verified computation , 2013, EuroSys '13.

[21]  Jason Bennett Thatcher,et al.  Blockchain Technology in Business and Information Systems Research , 2017, Business & Information Systems Engineering.

[22]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[23]  Martin Elsman,et al.  Futhark: purely functional GPU-programming with nested parallelism and in-place array updates , 2017, PLDI.

[24]  Xavier Leroy,et al.  The CompCert C verified compiler: Documentation and user’s manual , 2015 .

[25]  Craig Gentry,et al.  Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.

[26]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[27]  Grigore Rosu,et al.  IELE: An Intermediate-Level Blockchain Language Designed and Implemented Using Formal Semantics , 2018 .

[28]  Grigore Rosu,et al.  A Language-Independent Approach to Smart Contract Verification , 2018, ISoLA.

[29]  Jason Teutsch,et al.  Demystifying Incentives in the Consensus Computer , 2015, CCS.

[30]  Sanjay Jain,et al.  How to verify computation with a rational network , 2016, ArXiv.

[31]  Robin Teigland,et al.  Jumping on the Blockchain Bandwagon: Lessons of the Past and Outlook to the Future , 2016, ICIS.

[32]  Emin Gün Sirer,et al.  Enabling Strong Database Integrity using Trusted Execution Environments , 2018, ArXiv.

[33]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[34]  Karim R. Lakhani,et al.  Community, Joining, and Specialization in Open Source Software Innovation: A Case Study , 2003 .

[35]  Martin Fowler,et al.  Domain-Specific Languages , 2010, The Addison-Wesley signature series.