Fast two-party signature for upgrading ECDSA to two-party scenario easily

被引:2
|
作者
Tu, Binbin [1 ,2 ,3 ,4 ]
Chen, Yu [1 ,2 ,3 ]
Cui, Hongrui [5 ]
Wang, Xianfang [4 ]
机构
[1] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao 266237, Peoples R China
[4] CETC Cyberspace Secur Technol Co Ltd, Beijing 100070, Peoples R China
[5] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Two-party signature; ECDSA; Combinatorial ECDSA; Signing key protection;
D O I
10.1016/j.tcs.2023.114325
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
ECDSA is a standardized signature scheme and is widely used in many fields. However, most two-party ECDSA require a complicated multi-party computation technique to compute the multiplication of many shared secrets and necessitate expensive zero-knowledge proofs to deal with malicious adversaries.In this paper, we propose a simple yet fast two-party signing protocol based on ECDSA security, whose signing operation of each party is similar to the original ECDSA signing algorithm. Our protocol can enjoy the same efficiency as ECDSA and upgrades the existing ECDSA application to two-party scenario friendly. For this purpose, we first introduce a variant of ECDSA called combinatorial ECDSA, which is as secure as the standard ECDSA and can be easily divided into two parts. Then, we devise a two-party signing protocol without complicated multi-party computation from the combinatorial ECDSA and give the security proof based on ECDSA. Compared with the state-of-the-art two-party ECDSA, the signing result of each party in our protocol maintains the structure of ECDSA signature, which can be verified easily and avoids expensive zero-knowledge proofs. Last, we conduct an experimental evaluation, demonstrating that the performance of our combinatorial ECDSA and two-party signature is similar to ECDSA and the experimental results show that our proposed schemes are practical.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Fast Secure Two-Party ECDSA Signing
    Lindell, Yehuda
    JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [2] Fast Secure Two-Party ECDSA Signing
    Yehuda Lindell
    Journal of Cryptology, 2021, 34
  • [3] Fast Secure Two-Party ECDSA Signing
    Lindell, Yehuda
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 613 - 644
  • [4] Secure and efficient two-party ECDSA signature scheme
    Wang J.
    Wu L.
    Luo M.
    He D.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (02): : 12 - 25
  • [5] Efficient Online-friendly Two-Party ECDSA Signature
    Xue, Haiyang
    Au, Man Ho
    Xie, Xiang
    Yuen, Tsz Hon
    Cui, Handong
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 558 - 573
  • [6] An Efficient Two-Party ECDSA Scheme for Cryptocurrencies
    Syed, Habeeb
    Paul, Arinjita
    Singh, Meena
    Rajan, Ma
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 411 - 430
  • [7] Secure Two-party Threshold ECDSA from ECDSA Assumptions
    Doemer, Jack
    Kondi, Yashvanth
    Lee, Eysa
    Shelat, Abhi
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 980 - 997
  • [8] A Two-Party South?
    Silva, Ruth C.
    POLITICAL SCIENCE QUARTERLY, 1952, 67 (04) : 624 - 626
  • [9] A Two-Party South?
    Shannon, J. B.
    AMERICAN POLITICAL SCIENCE REVIEW, 1952, 46 (03) : 880 - 882
  • [10] A TWO-PARTY SOUTH?
    Heberle, Rudolf
    SOCIAL FORCES, 1952, 31 (01) : 84 - 85