Hmm, prediction markets are evil in general and I'm pretty much entirely opposed to their existence.
But it would be kinda hilarious to bet huge amounts of money that a 2048-bit RSA key won't be cracked by 2050.
Hmm, prediction markets are evil in general and I'm pretty much entirely opposed to their existence.
But it would be kinda hilarious to bet huge amounts of money that a 2048-bit RSA key won't be cracked by 2050.
@dalias e.g. some N distrustful parties each select two "random" numbers pi, qi. They do some SMC bullshit to securely compute p = p1 ^ ... ^ pN and q = q1 ^ ... ^ qN and check whether they're prime. If they're not, start over. If they are, securely compute and publish n = p*q.
Or something. I dunno crypto.

We present a new multiparty protocol for the distributed generation of biprime RSA moduli, with security against any subset of maliciously colluding parties assuming oblivious transfer and the hardness of factoring. Our protocol is highly modular, and its uppermost layer can be viewed as a template that generalizes the structure of prior works and leads to a simpler security proof. We introduce a combined sampling-and-sieving technique that eliminates both the inherent leakage in the approach of Frederiksen et al. (Crypto'18), and the dependence upon additively homomorphic encryption in the approach of Hazay et al. (JCrypt'19). We combine this technique with an efficient, privacy-free check to detect malicious behavior retroactively when a sampled candidate is not a biprime, and thereby overcome covert rejection-sampling attacks and achieve both asymptotic and concrete efficiency improvements over the previous state of the art.