SOLAREUM
HomeTelegramTwitterWebsiteBuy $SRM
  • 👋Solareum - Layer 1 Whitepaper
  • Solareum (SRM)
    • 📃Executive Summary
    • 🔥Solareum’s Solution
    • ⭐Solareum’s Value Proposition
    • 💫Final Thoughts
  • About Solareum
    • 👩‍🏫What is SolareumChain?
    • ➗Mathematical Analysis of Validators
  • Solareum Proof of Generation
    • 🧊Solareum Proof of Generation
    • 🛡️The BLS12-381 Elliptic Curve for zk-SNARK Proofs
      • FPGA Hardware
  • BLS Key Generation Signature Scheme Security
    • ♻️BLS Key Generation
      • Extract
      • Expand
      • IKM to lamport SK
      • parent SK to lamport PK
      • HKDF mod r
      • derive child SK
      • derive master SK
    • 💱Post-quantum security backup upgrade
  • SolareumChain Algorithmic Security
    • 🔏SolareumChain Algorithmic Security
    • 🔮BLS signature aggregation and Multisig security
      • BLS Signature Aggregation
      • Multisig Security
      • BLS signature aggregation definitions
    • 🍫Proving security definition references
      • Gedankenexperiment Setup
      • Gedankenexperiment Signature queries
      • Gedankenexperiment Forgery
      • Security and co-CDH Assumption
    • ✳️Adversaries and message query theorems
    • 💠Multi-Input Transactions and Transaction Validation Caching
      • SolareumChain Multi-Input Transactions
      • SolareumChain Transaction Validation Caching
  • SolareumChain ReFi Implementation
    • 💥Proof of Hold (PoH)
    • 🧇SolareumChain Inherited NFT Multipliers
  • SolareumChain Architecture and PoG Math
    • ⛓️SolareumChain Architecture and PoG Math
    • 💣Societal Impact of Blockchain Technology
    • 💡Energy Generation Analysis and Correlation
    • 🔋Energy Correlation Assurance Functions
    • 🧩zk-SNARK Validation
      • Case Study I: Proof of Hold and no Proof of Generation
      • Case Study II: No Proof of Hold and Proof of Generation
      • Case Study III: Proof of Hold and Proof of Generation
    • 🎴SolareumChain Address Generation
    • 🎱SolareumChain Genesis Architecture
    • 🍱Distributed Ledger Technology Energy Sustainability
    • 🌉SolareumChain Bridge
    • ⚡Sufficiency of Sub 128-bit Security for Pairing-Friendly Curves on SolareumChain
  • Other iNfo
    • 📝Conclusion
  • Community
    • 🌐Website
    • 🌠Telegram
    • ✖️Twitter
Powered by GitBook
On this page
  1. SolareumChain Algorithmic Security

Adversaries and message query theorems

PreviousSecurity and co-CDH AssumptionNextMulti-Input Transactions and Transaction Validation Caching

Last updated 1 year ago

Our innovative message query theorems redefine the boundaries of data integrity, ensuring that every piece of information exchanged within the Solareum network is not only secure but also transparently verifiable. We believe that in a world increasingly reliant on decentralized solutions, technical excellence in security is non-negotiable.

Theorem 1 Let A be an adversary attacking S ′ that makes no chosen message queries and at most one query to H1. Let ǫ = SIGadv[A, S ′ ; 0, QH0 , 1] be its advantage. Then there exists an adversary B for computing co-CDH, whose running time is about twice that of A, with advantage ǫ ′ = CDHadv[B ′ (G0), G1] such that ǫ ′ ≥ ǫ 2 − ǫ/N, where N = |R|, is the size of one coordinate in the image of H1, thus ǫ ≤ (1/N) + √ ǫ ′ .

Theorem 2 Let A be an adversary attacking S ′ that makes no chosen message queries but potentially many queries to H1. Then there exists an adversary B attacking S ′ , that makes only a single query to H1, and whose running time is about the same as A, such that

Theorem 3 Let A be an adversary attacking S ′ . Then there exists an adversary B attacking S ′ , that makes no chosen message queries and whose running time is about the same as A, such that

Corollary 1 For every adversary A attacking S there is a co-CDH algorithm B, whose running time is about twice that of A, such that

The proofs of which are left as an exercise to the reader.

where

✳️