Skip to main content

Briefing

This research resolves a major open problem by formally proving that Verifiable Delay Functions (VDFs) cannot exist in the Random Oracle Model (ROM), the common idealization for hash functions. The breakthrough is a non-existence proof demonstrating that any black-box construction of a VDF from standard primitives, such as one-way functions, can be trivially broken by a fast adversary in the ROM. This finding fundamentally re-architects the security basis for all decentralized systems relying on VDFs for provably fair randomness generation and transaction ordering, compelling them to move away from generic hash function assumptions toward complex, structured number-theoretic assumptions.

A dynamic, close-up view reveals an intricate mechanical core, composed of metallic silver and deep blue components, featuring a large gear-like outer ring with numerous vertical fins. Interacting with this structured mechanism is a vibrant, light blue, bubbly, organic-textured substance, flowing and connecting around the central elements

Context

Before this work, Verifiable Delay Functions were a critical theoretical tool, designed to enforce a minimum sequential computation time, which is essential for mitigating frontrunning and generating unbiasable public randomness in Proof-of-Stake consensus. The prevailing challenge was to establish their security under the weakest possible, most generic assumptions, specifically the Random Oracle Model, to ensure the primitive’s robustness regardless of the underlying cryptographic functions. The question of whether a black-box VDF construction could be proven secure in this model remained a foundational, unsolved problem in cryptographic theory.

A pristine white, textured material, resembling raw data or unverified transaction inputs, is shown interacting with a translucent, deep blue, structured element. This blue component, embodying a decentralized ledger or a sophisticated smart contract protocol, displays intricate, web-like patterns that signify cryptographic hashing and distributed node connectivity

Analysis

The paper’s core mechanism is a proof of impossibility, leveraging advanced oracle-presampling techniques. The logic dictates that a fast-computing adversary, which can query the Random Oracle (idealized hash function) a large number of times, can effectively simulate the VDF’s output much faster than the designated sequential delay time. The adversary’s speed is a function of its query complexity to the oracle, not the sequential computation steps. By showing the adversary can “pre-sample” the oracle’s outputs and use this information to construct a valid proof for a delayed computation in minimal time, the sequentiality property of the VDF is fundamentally violated under the ROM assumption.

A transparent, intricately structured pipeline, resembling interconnected data channels, showcases dynamic blue graphical elements within, indicative of on-chain metrics. Small effervescent particles adhere to the structure, suggesting real-time transaction throughput or distributed network activity

Parameters

  • Security Model InvalidatedRandom Oracle Model (ROM) – The idealized hash function model where the VDF non-existence is proven.
  • Primitives Ruled OutOne-Way Functions, One-Way Permutations – Standard cryptographic building blocks from which VDFs cannot be black-box constructed in the ROM.

The image presents a detailed, close-up view of a complex, futuristic mechanism featuring translucent, tube-like structures that house glowing blue internal components. These conduits appear to connect various metallic and dark blue elements, suggesting a system designed for intricate data or energy transfer

Outlook

This negative result immediately shifts the research focus for VDFs toward constructions based on structured number-theoretic problems, such as the hardness of finding square roots in hidden order groups, which do not rely on the ROM. In the next three to five years, this will lead to a bifurcation ∞ either protocols will adopt these more complex, non-ROM-based VDFs, or they will abandon VDFs entirely for randomness and fair ordering, driving new research into alternative MEV mitigation and decentralized randomness mechanisms that rely on different, provably secure cryptographic primitives.

A detailed close-up reveals an advanced mechanical assembly, featuring vibrant blue translucent conduits intertwined with metallic silver components. Gears, shafts, and structured housings are prominent, conveying an impression of intricate engineering and precise functionality

Verdict

This non-existence proof is a foundational theoretical correction, forcing a critical re-evaluation of the security assumptions underpinning all Verifiable Delay Function implementations in decentralized systems.

Cryptographic primitive, Verifiable Delay Function, Random Oracle Model, Non-existence proof, Black-box construction, Sequential computation, Fair transaction ordering, Decentralized randomness, Cryptographic assumption, Foundational security, Primitive limitations, Cryptographic model, Proof of impossibility, Delay function security, Consensus mechanism Signal Acquired from ∞ eprint.iacr.org

Micro Crypto News Feeds