Fast Batched Asynchronous Distributed Key Generation

被引:4
|
作者
Groth, Jens [1 ]
Shoup, Victor [2 ]
机构
[1] Nexus, New York, NY 10001 USA
[2] Offchain Labs, New York, NY 10018 USA
关键词
FACTORIZATIONS;
D O I
10.1007/978-3-031-58740-5_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present new protocols for threshold Schnorr signatures that work in an asynchronous communication setting, providing robustness and optimal resilience. These protocols provide unprecedented performance in terms of communication and computational complexity. In terms of communication complexity, for each signature, a single party must transmit a few dozen group elements and scalars across the network (independent of the size of the signing committee). In terms of computational complexity, the amortized cost for one party to generate a signature is actually less than that of just running the standard Schnorr signing or verification algorithm (at least for moderately sized signing committees, say, up to 100). For example, we estimate that with a signing committee of 49 parties, at most 16 of which are corrupt, we can generate 50,000 Schnorr signatures per second (assuming each party can dedicate one standard CPU core and 500 Mbs of network bandwidth to signing). Importantly, this estimate includes both the cost of an offline precomputation phase (which just churns out message independent "presignatures") and an online signature generation phase. Also, the online signing phase can generate a signature with very little network latency (just one to three rounds, depending on how throughput and latency are balanced). To achieve this result, we provide two new innovations. One is a new secret sharing protocol (again, asynchronous, robust, optimally resilient) that allows the dealer to securely distribute shares of a large batch of ephemeral secret keys, and to publish the corresponding ephemeral public keys. To achieve better performance, our protocol minimizes public-key operations, and in particular, is based on a novel technique that does not use the traditional technique based on "polynomial commitments". The second innovation is a new algorithm to efficiently combine ephemeral public keys contributed by different parties (some possibly corrupt) into a smaller number of secure ephemeral public keys. This new algorithm is based on a novel construction of a so-called "super-invertible matrix" along with a corresponding highly-efficient algorithm for multiplying this matrix by a vector of group elements. As protocols for verifiably sharing a secret key with an associated public key and the technology of super-invertible matrices both play a major role in threshold cryptography and multi-party computation, our two new innovations should have applicability well beyond that of threshold Schnorr signatures.
引用
收藏
页码:370 / 400
页数:31
相关论文
共 50 条
  • [1] Practical Asynchronous Distributed Key Generation
    Das, Sourav
    Yurek, Thomas
    Xiang, Zhuolun
    Miller, Andrew
    Kokoris-Kogias, Lefteris
    Ren, Ling
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 2518 - 2534
  • [2] Reaching Consensus for Asynchronous Distributed Key Generation
    Abraham, Ittai
    Jovanovic, Philipp
    Maller, Mary
    Meiklejohn, Sarah
    Stern, Gilad
    Tomescu, Alin
    PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC '21), 2021, : 363 - 373
  • [3] Reaching consensus for asynchronous distributed key generation
    Ittai Abraham
    Philipp Jovanovic
    Mary Maller
    Sarah Meiklejohn
    Gilad Stern
    Alin Tomescu
    Distributed Computing, 2023, 36 : 219 - 252
  • [4] Reaching consensus for asynchronous distributed key generation
    Abraham, Ittai
    Jovanovic, Philipp
    Maller, Mary
    Meiklejohn, Sarah
    Stern, Gilad
    Tomescu, Alin
    DISTRIBUTED COMPUTING, 2023, 36 (03) : 219 - 252
  • [5] Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling
    Das, Sourav
    Xiang, Zhuolun
    Kokoris-Kogias, Lefteris
    Ren, Ling
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 5359 - 5376
  • [6] Distributed asynchronous column generation
    Basso, Saverio
    Ceselli, Alberto
    COMPUTERS & OPERATIONS RESEARCH, 2022, 146
  • [7] Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures
    Kokoris-Kogias, Eleftherios
    Malkhi, Dahlia
    Spiegelman, Alexander
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1751 - 1767
  • [8] Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model
    Zhang, Haibin
    Duan, Sisi
    Liu, Chao
    Zhao, Boxin
    Meng, Xuanji
    Liu, Shengli
    Yu, Yong
    Zhang, Fangguo
    Zhu, Liehuang
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 568 - 581
  • [9] Asynchronous Prefix Recoverability for Fast Distributed Stores
    Li, Tianyu
    Chandramouli, Badrish
    Faleiro, Jose M.
    Madden, Samuel
    Kossmann, Donald
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 1090 - 1102
  • [10] Program Transformations for Asynchronous and Batched Query Submission
    Ramachandra, Karthik
    Chavan, Mahendra
    Guravannavar, Ravindra
    Sudarshan, S.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (02) : 531 - 544