Threshold ECDSA with an Offline Recovery Party

被引:4
作者
Battagliola, Michele [1 ]
Longo, Riccardo [1 ]
Meneghetti, Alessio [1 ]
Sala, Massimiliano [1 ]
机构
[1] Univ Trento, Dept Math, Via Sommar 14, I-38123 Povo, Trento, Italy
关键词
94A60; cryptography; 12E20 finite fields; 14H52 elliptic curves; 94A62 authentication and secret sharing; 68W40 analysis of algorithms; SIGNATURES; SECURE;
D O I
10.1007/s00009-021-01886-3
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A (t, n)-threshold signature scheme enables distributed signing among n players such that any subset of size at least t can sign, whereas any subset with fewer players cannot. Our goal is to produce digital signatures that are compatible with an existing centralized signature scheme: the key-generation and signature algorithms are replaced by a communication protocol between the players, but the verification algorithm remains identical to that of a signature issued using the centralized algorithm. Starting from the threshold scheme for the ECDSA signature due to Gennaro and Goldfeder, we present the first protocol that supports multiparty signatures with an offline participant during the key-generation phase and that does not rely on a trusted third party. Under standard assumptions on the underlying algebraic and geometric problems (e.g. the Discrete Logarithm Problem for an elliptic curve and the computation of eth root on semi-prime residue rings), we prove our scheme secure against adaptive malicious adversaries.
引用
收藏
页数:29
相关论文
共 36 条
[1]  
Bellare M., 2005, Introduction to Modern Cryptogra- phy
[2]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[3]  
Boneh D., 2017, USING LEVEL
[4]  
Brandao L.T.A.N., NIST roadmap toward criteria for threshold schemes for cryptographic primitives
[5]  
Canetti R., 2020, IACR CRYPTOL EPRINT, P492
[6]  
Chohan U. W., 2018, The problems of cryptocurrency thefts and exchange shutdowns
[7]  
Di Nicola V., 2020, CUSTODY CONIO 3
[8]   Secure Two-party Threshold ECDSA from ECDSA Assumptions [J].
Doemer, Jack ;
Kondi, Yashvanth ;
Lee, Eysa ;
Shelat, Abhi .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :980-997
[9]   Threshold ECDSA from ECDSA Assumptions: The Multiparty Case [J].
Doerner, Jack ;
Kondi, Yashvanth ;
Lee, Eysa ;
Shelat, Abhi .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1051-1066
[10]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472