Practical Asynchronous Distributed Key Generation

被引:0
|
作者
Das, Sourav [1 ]
Yurek, Thomas [1 ]
Xiang, Zhuolun [1 ]
Miller, Andrew [1 ]
Kokoris-Kogias, Lefteris [2 ]
Ren, Ling [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
[2] IST Austria, Klosterneuburg, Austria
关键词
MANAGEMENT;
D O I
10.1109/SP46214.2022.00120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems without a trusted third party and is a building block to decentralized protocols such as randomness beacons, threshold signatures, and general multiparty computation. Until recently, DKG protocols have assumed the synchronous model and thus are vulnerable when their underlying network assumptions do not hold. The recent advancements in asynchronous DKG protocols are insufficient as they either have poor efficiency or limited functionality, resulting in a lack of concrete implementations. In this paper, we present a simple and concretely efficient asynchronous DKG (ADKG) protocol. In a network of n nodes, our ADKG protocol can tolerate up to t < n=3 malicious nodes and have an expected O(k n(3)) communication cost, where k is the security parameter. Our ADKG protocol produces a field element as the secret and is thus compatible with offthe-shelf threshold cryptosystems. We implement our ADKG protocol and evaluate it using a network of up to 128 nodes in geographically distributed AWS instances. Our evaluation shows that our protocol takes as low as 3 and 9.5 seconds to terminate for 32 and 64 nodes, respectively. Also, each node sends only 0.7 Megabytes and 2.9 Megabytes of data during the two experiments, respectively.
引用
收藏
页码:2518 / 2534
页数:17
相关论文
共 50 条
  • [31] Optimum practical design of distributed and asynchronous power control for wireless networks with shared bands
    Kucera, Stepan
    Yamamoto, Koji
    Yoshida, Susumu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (07) : 1261 - 1270
  • [32] Post-quantum Asynchronous Remote Key Generation for FIDO2
    Brendel, Jacqueline
    Clermont, Sebastian
    Fischlin, Marc
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT III, 2025, 15486 : 465 - 493
  • [33] Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices
    Frymann, Nick
    Gardham, Daniel
    Manulis, Mark
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 928 - 941
  • [34] Towards Practical Biometric Key Generation with Randomized Biometric Templates
    Ballard, Lucas
    Kamara, Seny
    Monrose, Fabian
    Reiter, Michael K.
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 235 - 244
  • [35] Automatic Distributed Code Generation from Formal Models of Asynchronous Concurrent Processes
    Evrard, Hugues
    Lang, Frederic
    23RD EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2015), 2015, : 459 - 466
  • [36] ASYNCHRONOUS DISTRIBUTED DETECTION
    CHANG, W
    KAM, MS
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 1994, 30 (03) : 818 - 826
  • [37] Distributed Asynchronous Automata
    Baudru, Nicolas
    CONCUR 2009 - CONCURRENCY THEORY, PROCEEDINGS, 2009, 5710 : 115 - 130
  • [38] Automatic distributed asynchronous control circuit generation from data flow graph for asynchronous high-level synthesis
    Kim, E
    Lee, JG
    Lee, DI
    ISCAS 2000: IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - PROCEEDINGS, VOL II: EMERGING TECHNOLOGIES FOR THE 21ST CENTURY, 2000, : 49 - 52
  • [39] Secure Distributed Key Generation in Attribute Based Encryption Systems
    Pletea, Daniel
    Sedghi, Saeed
    Veeningen, Meilof
    Petkovic, Milan
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 103 - 107
  • [40] Distributed key generation based on vector space access structures
    Zhang, Fu-Tai
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (05): : 816 - 819