Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain

被引:6
作者
Feng, Qi [1 ]
Yang, Kang [2 ]
Ma, Mimi [2 ,3 ]
He, Debiao [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Univ Technol, Coll Informat Sci & Engn, Zhengzhou 450001, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Protocols; Security; Blockchains; Cryptocurrency; Mobile handsets; Servers; NIST; Multi-party computation; EdDSA; identifiable abort; key confidentiality; cryptocurrency; blockchain;
D O I
10.1109/TIFS.2023.3256710
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of secret keys for blockchain-based applications is increasingly important, partly because the theft of secret keys will render a significant financial loss. To guarantee the security of secret keys, many multi-party signature protocols have been proposed. However, few of them are designed for EdDSA-based blockchain that is developing in growth. The folklore and the NIST document for standardizing threshold schemes believe that a distributed hash evaluation is required to design multi-party EdDSA protocols, which leads to a relatively large overhead. In this paper, we present two practical multi-party EdDSA protocols for semi-honest and malicious settings. Our protocols eliminate the distributed hashing by securely maintaining a global state, which is feasible for EdDSA-based blockchain. Furthermore, we extend the malicious protocol to resist DoS attacks by identifying corrupted parties in case of execution aborts. We implemented our EdDSA protocols for different parties using Alibaba cloud servers with all instances of type ecs.t5-c1m2.large. Our protocol in the malicious setting takes 1.51-15.3 ms between 2 parties and 5 parties, and are two orders of magnitude faster than the recent threshold EdDSA protocol. These properties (efficient, identifiable abort, high compatibility) make the two protocols ideal for threshold wallets for EdDSA-based cryptocurrency.
引用
收藏
页码:1937 / 1950
页数:14
相关论文
共 39 条
  • [1] Abram A., 2022, P IEEE S SEC PRIV SP, P2554
  • [2] [Anonymous], ETH FIND POP PLAC
  • [3] Baum E., LECT NOTES COMPUTER, V12171
  • [4] Bellare M, 1998, LECT NOTES COMPUT SC, V1403, P236, DOI 10.1007/BFb0054130
  • [5] Bernstein N., LECT NOTES COMPUTER, V6917
  • [6] Boneh R., LECT NOTES COMPUTER, V11368
  • [7] Thresholdizing HashEdDSA: MPC to the Rescue
    Bonte, Charlotte
    Smart, Nigel P.
    Tanguy, Titouan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (06) : 879 - 894
  • [8] Brandao M., 2019, 8214A NISTIR
  • [9] UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts
    Canetti, Ran
    Gennaro, Rosario
    Goldfeder, Steven
    Makriyannis, Nikolaos
    Peled, Udi
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1769 - 1787
  • [10] cardanodocs, CARDANO SETTLEMENT L