Practical Asynchronous Distributed Key Generation

被引:0
|
作者
Das, Sourav [1 ]
Yurek, Thomas [1 ]
Xiang, Zhuolun [1 ]
Miller, Andrew [1 ]
Kokoris-Kogias, Lefteris [2 ]
Ren, Ling [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
[2] IST Austria, Klosterneuburg, Austria
关键词
MANAGEMENT;
D O I
10.1109/SP46214.2022.00120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trusted third party and is a building block to decentralized protocols such as randomness beacons, threshold signatures, and general multiparty computation. Until recently, DKG protocols have assumed the synchronous model and thus are vulnerable when their underlying network assumptions do not hold. The recent advancements in asynchronous DKG protocols are insufficient as they either have poor efficiency or limited functionality, resulting in a lack of concrete implementations. In this paper, we present a simple and concretely efficient asynchronous DKG (ADKG) protocol. In a network of n nodes, our ADKG protocol can tolerate up to t < n=3 malicious nodes and have an expected O(k n(3)) communication cost, where k is the security parameter. Our ADKG protocol produces a field element as the secret and is thus compatible with offthe-shelf threshold cryptosystems. We implement our ADKG protocol and evaluate it using a network of up to 128 nodes in geographically distributed AWS instances. Our evaluation shows that our protocol takes as low as 3 and 9.5 seconds to terminate for 32 and 64 nodes, respectively. Also, each node sends only 0.7 Megabytes and 2.9 Megabytes of data during the two experiments, respectively.
引用
收藏
页码:2518 / 2534
页数:17
相关论文
共 50 条
  • [1] Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling
    Das, Sourav
    Xiang, Zhuolun
    Kokoris-Kogias, Lefteris
    Ren, Ling
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 5359 - 5376
  • [2] Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model
    Zhang, Haibin
    Duan, Sisi
    Liu, Chao
    Zhao, Boxin
    Meng, Xuanji
    Liu, Shengli
    Yu, Yong
    Zhang, Fangguo
    Zhu, Liehuang
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 568 - 581
  • [3] Fast Batched Asynchronous Distributed Key Generation
    Groth, Jens
    Shoup, Victor
    ADVANCES IN CRYPTOLOGY, PT V, EUROCRYPT 2024, 2024, 14655 : 370 - 400
  • [4] Reaching Consensus for Asynchronous Distributed Key Generation
    Abraham, Ittai
    Jovanovic, Philipp
    Maller, Mary
    Meiklejohn, Sarah
    Stern, Gilad
    Tomescu, Alin
    PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC '21), 2021, : 363 - 373
  • [5] Reaching consensus for asynchronous distributed key generation
    Ittai Abraham
    Philipp Jovanovic
    Mary Maller
    Sarah Meiklejohn
    Gilad Stern
    Alin Tomescu
    Distributed Computing, 2023, 36 : 219 - 252
  • [6] Reaching consensus for asynchronous distributed key generation
    Abraham, Ittai
    Jovanovic, Philipp
    Maller, Mary
    Meiklejohn, Sarah
    Stern, Gilad
    Tomescu, Alin
    DISTRIBUTED COMPUTING, 2023, 36 (03) : 219 - 252
  • [7] Practical large-scale distributed key generation
    Canny, J
    Sorkin, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 138 - 152
  • [8] On A Practical Distributed Key Generation Scheme Based on Bivariate Polynomials
    Wu Qian
    Chen, Huiyan
    Li, Zichen
    Jia, Cheng
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [9] Practical distributed secret key generation for delay tolerant networks
    Xie, Yongming
    Wang, Guojun
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (14): : 2067 - 2079
  • [10] Distributed asynchronous column generation
    Basso, Saverio
    Ceselli, Alberto
    COMPUTERS & OPERATIONS RESEARCH, 2022, 146