Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security

被引:133
作者
Gennaro, Rosario [1 ]
Goldfeder, Steven [2 ]
Narayanan, Arvind [2 ]
机构
[1] CUNY, City Coll, New York, NY 10021 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016 | 2016年 / 9696卷
关键词
PUBLIC-KEY CRYPTOSYSTEMS; TRAPDOOR COMMITMENTS; KNOWLEDGE; CRYPTOGRAPHY; ATTACKS; PROOFS;
D O I
10.1007/978-3-319-39555-5_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. The properties of DSA make it quite challenging to build a threshold version. In this paper, we present a threshold DSA scheme that is efficient and optimal. We also present a compelling application to use our scheme: securing Bitcoin wallets. Bitcoin thefts are on the rise, and threshold DSA is necessary to secure Bitcoin wallets. Our scheme is the first general threshold DSA scheme that does not require an honest majority and is useful for securing Bitcoin wallets.
引用
收藏
页码:156 / 174
页数:19
相关论文
共 35 条
  • [1] Andresen Gavin., Github: Shared Wallets Design
  • [2] [Anonymous], 2013, LIST BITC HEISTS
  • [3] [Anonymous], 2008, BITCOIN PEER TO PEER
  • [4] [Anonymous], 1999, LNCS, DOI DOI 10.1007/3-540-48405-1_7
  • [5] [Anonymous], 2013, COINJ PRIV REAL WORL
  • [6] Baric N., 1997, Advances in Cryptology- Proceedings of Eurocrypt '97, V1233, P480
  • [7] Baudron O., PODC 2001
  • [8] Mixcoin: Anonymity for Bitcoin with Accountable Mixes
    Bonneau, Joseph
    Narayanan, Arvind
    Miller, Andrew
    Clark, Jeremy
    Kroll, Joshua A.
    Felten, Edward W.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 486 - 504
  • [9] Camenisch J, 2011, LECT NOTES COMPUT SC, V7073, P449, DOI 10.1007/978-3-642-25385-0_24
  • [10] Camenisch J, 2009, LECT NOTES COMPUT SC, V5479, P425, DOI 10.1007/978-3-642-01001-9_25