How are rock-scissors-paper and Ethereum scalability related?
Rock-scissors-paper game is a well-known game in the world. When two people play this game, the important thing is that both of them have to disclose their selection concurrently. However, it seems infeasible to create something concurrent with smart contract and make it work. This case study is good for brainstorming Ethereum Privacy and in my point of view, Ethereum Privacy will be the next challenge of Ethereum community after Ethereum Scalability.
The hash is actually irreversible but the number of values is two small, so they can make a bruce-force attack easily.
For example, Victor — victim — is the first person submit his hash of selection in submitting phase and Alice — attacker — tries to guess Victor’s selection and make a selection to compete Victor. Assuming that Victor chose rock
and submitted: 10977e4d68108…
to smart contract. Alice just waits for Victor’s submission, gets Victor’s hash, looks for value correspond with the hash. It is feasible for Alice to know that Victor’s selection is rock
and then she submits hash of paper
to compete Victor.
Yeah, there you are 👉. The content above is just a kind of warming-up and this problem is actually what I would like to brainstorm and understand how fun of privacy.
Privacy problem of rock-scissors-paper game
To solve this problem, we need a thing that totally hides the decisions but still assures that would be unchangeable. It may have a lot of solutions but in this article, I just have presented two solutions I got.
One solution bases on mathematic and it uses modulo in detail. The other bases on an idea used in zkSNARK, it uses secret number (Note that it’s not a zkSNARK instance).
The solution based on mathematic
Let’s change the game a little bit. We won’t use rock
, scissors
and paper
to present the selections any more. Instead of that, we will use n
with mod(3) = {0, 1, 2}
as {rock, scissors, paper}
respectively. And the important thing that n
is a secret-random number.
Assume that Victor chooses rock
, in order to do that he has to choose random n
so that n mod(3) = 0
.
For example:
n = 13714425016816510474524816299716591239769767123746972631
n mod(3) = 0
In submitting phase, Victor hashes n
and submits this hash to smart contract. Obviously, Alice has no idea which number Victor chose and submitted by the bruce-force attack. To verify Victor’s selection, Alice just only gets Victor’s n
at disclosing phase and make a verification.
The solution is based on secret number
If you have never gotten any knowledge about zkSNARK, you can take a look at my previous article here.
And the idea using secret number is in “Zero-knowledge proof with a game for computers” part.
In this solution, we don’t need to change the original game but we would change the protocol.
Every time Victor or Alice wanna submit their hash of selection, they have to pick a secret-random number s
and from now, the hash is the hash of combination of the selection and s
. At disclosing phase, Victor and Alice have to disclose secret-random number s
as well as their selection to be possible to verify each other.
For example: