Secure Two-party Threshold ECDSA from ECDSA Assumptions

被引:98
作者
Doemer, Jack [1 ]
Kondi, Yashvanth [1 ]
Lee, Eysa [1 ]
Shelat, Abhi [1 ]
机构
[1] Northeastern Univ, Boston, MA 02115 USA
来源
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2018年
关键词
D O I
10.1109/SP.2018.00036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used schemes in deployed cryptography. Through its applications in code and binary authentication, web security, and cryptocurrency, it is likely one of the few cryptographic algorithms encountered on a daily basis by the average person. However, its design is such that executing multi-party or threshold signatures in a secure manner is challenging: unlike other, less widespread signature schemes, secure multi-party ECDSA requires custom protocols, which has heretofore implied reliance upon additional cryptographic assumptions such as the Paillier encryption scheme. We propose new protocols for multi-party ECDSA key generation and signing with a threshold of two, which we prove secure against malicious adversaries in the random oracle model using only the Computational Diffie-Hellman Assumption and the assumptions already implied by ECDSA itself. Our scheme requires only two messages, and via implementation we find that it outperforms the best prior results in practice by a factor of 55 for key generation and 16 for signing, coming to within a factor of 12 of local signatures. Concretely, two parties can jointly sign a message in just over two milliseconds.
引用
收藏
页码:980 / 997
页数:18
相关论文
共 59 条
[31]  
Gilboa N., 1999, CRYPTO
[32]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[33]  
Hoffman P., 2012, Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC
[34]   Efficient cryptographic schemes provably as secure as subset sum [J].
Impagliazzo, R ;
Naor, M .
JOURNAL OF CRYPTOLOGY, 1996, 9 (04) :199-216
[35]  
Ishai Yuval, 2011, EUROCRYPT
[36]  
Katz Jonathan., 2015, INTRO MODERN CRYPTOG, VSecond, P443
[37]  
Keller Marcel., 2015, CRYPTO
[38]  
Koblitz Neal, 2006, Paper 2006/230
[39]  
Kravitz D. W., 1993, U.S. Patent, Patent No. [US5231668A, 5231668]
[40]  
Langford SusanK., 1995, CRYPTO