首页> 外文会议>IEEE Symposium on Security and Privacy >Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
【24h】

Threshold ECDSA from ECDSA Assumptions: The Multiparty Case

机译:ECDSA假设的阈值ECDSA:多方案例

获取原文

摘要

Cryptocurrency applications have spurred a resurgence of interest in the computation of ECDSA signatures using threshold protocols---that is, protocols in which the signing key is secret-shared among n parties, of which any subset of size t must interact in order to compute a signature. Among the resulting works to date, that of Doerner et al. requires the most natural assumptions while also achieving the best practical signing speed. It is, however, limited to the setting in which the threshold is two. We propose an extension of their scheme to arbitrary thresholds, and prove it secure against a malicious adversary corrupting up to one party less than the threshold under only the Computational Diffie-Hellman assumption in the Random Oracle model, an assumption strictly weaker than those under which ECDSA is proven. Whereas the best current schemes for threshold-two ECDSA signing use a Diffie-Hellman Key Exchange to calculate each signature's nonce, a direct adaptation of this technique to a larger threshold t would incur a round count linear in t; thus we abandon it in favor of a new mechanism that yields a protocol requiring log(t)+6 rounds in total. We design a new consistency check, similar in spirit to that of Doerner et al., but suitable for an arbitrary number of participants, and we optimize the underlying two-party multiplication protocol on which our scheme is based, reducing its concrete communication and computation costs. We implement our scheme and evaluate it among groups of up to 256 of co-located and 128 geographically-distributed parties, and among small groups of embedded devices. We find that in the LAN setting, our scheme outperforms all prior works by orders of magnitude, and that it is efficient enough for use even on smartphones or hardware tokens. In the WAN setting we find that, despite its logarithmic round count, our protocol outperforms the best constant-round protocols in realistic scenarios.
机译:加密货币应用激起了人们对使用阈值协议进行ECDSA签名计算的兴趣的兴起-也就是说,其中签名密钥在n个参与方之间秘密共享的协议,大小为t的任何子集都必须交互才能进行计算一个签名。在迄今为止的所有成果中,Doerner等人的成果。需要最自然的假设,同时也要达到最佳的实际签名速度。但是,它仅限于阈值为2的设置。我们提议将他们的方案扩展到任意阈值,并证明它可以防止恶意对手在随机Oracle模型中仅以Computetional Diffie-Hellman假设(该假设严格小于该假设)的情况下破坏不超过该阈值的一方。 ECDSA已被证明。当前用于阈值二ECDSA签名的最佳方案是使用Diffie-Hellman密钥交换来计算每个签名的现时值,而将这种技术直接应用于更大的阈值t则会导致以t为线性的整数。因此,我们放弃了它,转而使用一种新机制,该机制产生的协议总共需要log(t)+6回合。我们设计了一个新的一致性检查,该检查的实质与Doerner等人的检查类似,但适用于任意数量的参与者,并且我们优化了该方案所基于的底层两方乘法协议,从而减少了其具体的通信和计算量费用。我们实施我们的方案,并在多达256个位于同一地点和128个地理分布的参与者的组中以及在嵌入式设备的小型组中对其进行评估。我们发现,在LAN设置中,我们的方案比以前的所有工作都好几个数量级,并且即使在智能手机或硬件令牌上使用,该方案也足够有效。在WAN设置中,我们发现,尽管其对数取整,但在实际情况下,我们的协议仍优于最佳的恒定整数协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号