Practical Asynchronous Distributed Key Generation

被引:0
|
作者
Das, Sourav [1 ]
Yurek, Thomas [1 ]
Xiang, Zhuolun [1 ]
Miller, Andrew [1 ]
Kokoris-Kogias, Lefteris [2 ]
Ren, Ling [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
[2] IST Austria, Klosterneuburg, Austria
关键词
MANAGEMENT;
D O I
10.1109/SP46214.2022.00120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trusted third party and is a building block to decentralized protocols such as randomness beacons, threshold signatures, and general multiparty computation. Until recently, DKG protocols have assumed the synchronous model and thus are vulnerable when their underlying network assumptions do not hold. The recent advancements in asynchronous DKG protocols are insufficient as they either have poor efficiency or limited functionality, resulting in a lack of concrete implementations. In this paper, we present a simple and concretely efficient asynchronous DKG (ADKG) protocol. In a network of n nodes, our ADKG protocol can tolerate up to t < n=3 malicious nodes and have an expected O(k n(3)) communication cost, where k is the security parameter. Our ADKG protocol produces a field element as the secret and is thus compatible with offthe-shelf threshold cryptosystems. We implement our ADKG protocol and evaluate it using a network of up to 128 nodes in geographically distributed AWS instances. Our evaluation shows that our protocol takes as low as 3 and 9.5 seconds to terminate for 32 and 64 nodes, respectively. Also, each node sends only 0.7 Megabytes and 2.9 Megabytes of data during the two experiments, respectively.
引用
收藏
页码:2518 / 2534
页数:17
相关论文
共 50 条
  • [21] Distributed key generation as a component of an integrated protocol
    Chu, CK
    Tzeng, WG
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 411 - 421
  • [22] H2CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network
    Xiang, Axin
    Gao, Hongfeng
    Tian, Youliang
    Xiong, Jinbo
    Wang, Linjie
    Peng, Changgen
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33758 - 33772
  • [23] Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems
    Frymann, Nick
    Gardham, Daniel
    Manulis, Mark
    Nartz, Hugo
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 394 - 421
  • [24] Asynchronous Distributed Generation System Based on Asymmetrical Cascaded Multilevel Inverter
    Pimentel, Sergio Pires
    Pomilio, Jose Antenor
    IECON 2008: 34TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-5, PROCEEDINGS, 2008, : 3118 - 3123
  • [25] CSI-RAShi: Distributed Key Generation for CSIDH
    Beullens, Ward
    Disson, Lucas
    Pedersen, Robi
    Vercauteren, Frederik
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 257 - 276
  • [26] A distributed key generation for mobile Ad Hoc network
    Liu, Linqiang
    Song, Rushun
    Zhang, Lihua
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (06): : 181 - 182
  • [27] Optimal Placement of Distributed Generation: An Overview and Key Issues
    Yadav, Alka
    Srivastava, Laxmi
    2014 INTERNATIONAL CONFERENCE ON POWER SIGNALS CONTROL AND COMPUTATIONS (EPSCICON), 2014,
  • [28] PRACTICAL ASYNCHRONOUS DESIGN
    CHU, TA
    ROY, RK
    IEEE DESIGN & TEST OF COMPUTERS, 1994, 11 (02): : 6 - 7
  • [29] Practical asynchronous measurement-device-independent quantum key distribution with advantage distillation
    Luo, Di
    Liu, Xin
    Qin, Kaibiao
    Zhang, Zhenrong
    Wei, Kejin
    PHYSICAL REVIEW A, 2024, 110 (02)
  • [30] Dishonest Node Identification for Key Sharing Systems through Distributed Key Generation
    Kalkavan, Tugce
    Koltuksuz, Ahmet
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 188 - 193