Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations

被引:44
|
作者
Castagnos, Guilhem [1 ]
Catalano, Dario [2 ]
Laguillaumie, Fabien [3 ]
Savasta, Federico [2 ,4 ]
Tucker, Ida [3 ]
机构
[1] Univ Bordeaux, CNRS, Inria, IMB UMR 5251, F-33405 Talence, France
[2] Univ Catania, Catania, Italy
[3] Univ Lyon, CNRS, EnsL, UCBL,Inria,LIP, F-69342 Lyon 07, France
[4] Scuola Super Catania, Catania, Italy
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III | 2019年 / 11694卷
关键词
THRESHOLD; CRYPTOSYSTEMS; DECRYPTION; SECURITY; NUMBER;
D O I
10.1007/978-3-030-26954-8_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ECDSA is a widely adopted digital signature standard. Unfortunately, efficient distributed variants of this primitive are notoriously hard to achieve and known solutions often require expensive zero knowledge proofs to deal with malicious adversaries. For the two party case, Lindell [Lin17] recently managed to get an efficient solution which, to achieve simulation-based security, relies on an interactive, non standard, assumption on Paillier's cryptosystem. In this paper we generalize Lindell's solution using hash proof systems. The main advantage of our generic method is that it results in a simulation-based security proof without resorting to non-standard interactive assumptions. Moving to concrete constructions, we show how to instantiate our framework using class groups of imaginary quadratic fields. Our implementations show that the practical impact of dropping such interactive assumptions is minimal. Indeed, while for 128-bit security our scheme is marginally slower than Lindell's, for 256-bit security it turns out to be better both in key generation and signing time. Moreover, in terms of communication cost, our implementation significantly reduces both the number of rounds and the transmitted bits without exception.
引用
收藏
页码:191 / 221
页数:31
相关论文
共 8 条
  • [1] Fast Secure Two-Party ECDSA Signing
    Lindell, Yehuda
    JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [2] Fast Secure Two-Party ECDSA Signing
    Lindell, Yehuda
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 613 - 644
  • [3] Efficient Two-Party Exponentiation from Quotient Transfer
    Lu, Yi
    Hara, Keisuke
    Ohara, Kazuma
    Schuldt, Jacob
    Tanaka, Keisuke
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 643 - 662
  • [4] An efficient two-party identity-based key exchange protocol
    Tseng, Yuh-Min
    INFORMATICA, 2007, 18 (01) : 125 - 136
  • [5] Efficient Two-Party Private Blocking based on Sorted Nearest Neighborhood Clustering
    Vatsalan, Dinusha
    Christen, Peter
    Verykios, Vassilios S.
    PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, : 1949 - 1958
  • [6] Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing
    Wu, Yulin
    Wang, Xuan
    Susilo, Willy
    Yang, Guomin
    Jiang, Zoe Lin
    Chen, Qian
    Xu, Peng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2820 - 2834
  • [7] TOWARD A TWO-PARTY SYSTEM OR TWO PARTY SYSTEMS? Patterns of Competition in Japan's Single-Member Districts, 1996-2005
    Jou, Willy
    PARTY POLITICS, 2010, 16 (03) : 370 - 393
  • [8] Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions
    Kondi, Yashvanth
    Orlandi, Claudio
    Roy, Lawrence
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 646 - 677