Fast Batched Asynchronous Distributed Key Generation

被引:4
|
作者
Groth, Jens [1 ]
Shoup, Victor [2 ]
机构
[1] Nexus, New York, NY 10001 USA
[2] Offchain Labs, New York, NY 10018 USA
关键词
FACTORIZATIONS;
D O I
10.1007/978-3-031-58740-5_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present new protocols for threshold Schnorr signatures that work in an asynchronous communication setting, providing robustness and optimal resilience. These protocols provide unprecedented performance in terms of communication and computational complexity. In terms of communication complexity, for each signature, a single party must transmit a few dozen group elements and scalars across the network (independent of the size of the signing committee). In terms of computational complexity, the amortized cost for one party to generate a signature is actually less than that of just running the standard Schnorr signing or verification algorithm (at least for moderately sized signing committees, say, up to 100). For example, we estimate that with a signing committee of 49 parties, at most 16 of which are corrupt, we can generate 50,000 Schnorr signatures per second (assuming each party can dedicate one standard CPU core and 500 Mbs of network bandwidth to signing). Importantly, this estimate includes both the cost of an offline precomputation phase (which just churns out message independent "presignatures") and an online signature generation phase. Also, the online signing phase can generate a signature with very little network latency (just one to three rounds, depending on how throughput and latency are balanced). To achieve this result, we provide two new innovations. One is a new secret sharing protocol (again, asynchronous, robust, optimally resilient) that allows the dealer to securely distribute shares of a large batch of ephemeral secret keys, and to publish the corresponding ephemeral public keys. To achieve better performance, our protocol minimizes public-key operations, and in particular, is based on a novel technique that does not use the traditional technique based on "polynomial commitments". The second innovation is a new algorithm to efficiently combine ephemeral public keys contributed by different parties (some possibly corrupt) into a smaller number of secure ephemeral public keys. This new algorithm is based on a novel construction of a so-called "super-invertible matrix" along with a corresponding highly-efficient algorithm for multiplying this matrix by a vector of group elements. As protocols for verifiably sharing a secret key with an associated public key and the technology of super-invertible matrices both play a major role in threshold cryptography and multi-party computation, our two new innovations should have applicability well beyond that of threshold Schnorr signatures.
引用
收藏
页码:370 / 400
页数:31
相关论文
共 50 条
  • [31] CSI-RAShi: Distributed Key Generation for CSIDH
    Beullens, Ward
    Disson, Lucas
    Pedersen, Robi
    Vercauteren, Frederik
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 257 - 276
  • [32] A distributed key generation for mobile Ad Hoc network
    Liu, Linqiang
    Song, Rushun
    Zhang, Lihua
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (06): : 181 - 182
  • [33] Optimal Placement of Distributed Generation: An Overview and Key Issues
    Yadav, Alka
    Srivastava, Laxmi
    2014 INTERNATIONAL CONFERENCE ON POWER SIGNALS CONTROL AND COMPUTATIONS (EPSCICON), 2014,
  • [34] Practical large-scale distributed key generation
    Canny, J
    Sorkin, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 138 - 152
  • [35] Dishonest Node Identification for Key Sharing Systems through Distributed Key Generation
    Kalkavan, Tugce
    Koltuksuz, Ahmet
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 188 - 193
  • [36] Key Generation for Fast Inversion of the Paillier Encryption Function
    Hirano, Takato
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (06) : 1111 - 1121
  • [37] Post-quantum Asynchronous Remote Key Generation for FIDO2
    Brendel, Jacqueline
    Clermont, Sebastian
    Fischlin, Marc
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT III, 2025, 15486 : 465 - 493
  • [38] Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices
    Frymann, Nick
    Gardham, Daniel
    Manulis, Mark
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 928 - 941
  • [39] Automatic Distributed Code Generation from Formal Models of Asynchronous Concurrent Processes
    Evrard, Hugues
    Lang, Frederic
    23RD EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2015), 2015, : 459 - 466
  • [40] ASYNCHRONOUS DISTRIBUTED DETECTION
    CHANG, W
    KAM, MS
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 1994, 30 (03) : 818 - 826