Abstract
The concept of verifiable delay functions has received attention from researchers since it was first proposed in 2018. The applications of verifiable delay are also widespread in blockchain research, such as: computational timestamping, public random beacons, resource-efficient blockchains, and proofs of data replication. This paper introduces the concept of verifiable delay functions and systematically summarizes the types of verifiable delay functions. Firstly, the description and characteristics of verifiable delay functions are given, and weak verifiable delay functions, incremental verifiable delay functions, decodable verifiable delay functions, and trapdoor verifiable delay functions are introduced respectively. The construction of verifiable delay functions generally relies on two security assumptions: algebraic assumption or structural assumption. Then, the security assumptions of two different verifiable delay functions are described based on cryptography theory. Secondly, a post-quantum verifiable delay function based on super-singular isogeny is introduced. Finally, the paper summarizes the blockchain-related applications of verifiable delay functions.
Funder
National Natural Science Foundation of China
National Key R&D Program of China
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference69 articles.
1. Verifiable delay functions;Boneh;Proceedings of the Annual International Cryptology Conference,2018
2. Simple and efficient batch verification techniques for verifiable delay functions;Rotem;Proceedings of the Theory of Cryptography Conference,2021
3. An improved blockchain consensus protocol with distributed verifiable delay function;Zhou;Proceedings of the 2021 IEEE International Conference on Electronic Technology, Communication & Information,2021
4. Design and Implementation of a Low-Latency Modular Multiplication Algorithm
5. Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs;Lombardi;Proceedings of the 40th Annual International Cryptology Conference,2020
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献