Filters








376 Hits in 3.3 sec

Improving security for users of decentralized exchanges through multiparty computation [article]

Robert Annessi, Ethan Fast
2021 arXiv   pre-print
Our protocol works with both ECDSA and EdDSA signature schemes and prioritizes efficient computation and communication.  ...  Decentralized cryptocurrency exchanges offer compelling security benefits over centralized exchanges: users control their funds and avoid the risk of an exchange hack or malicious operator.  ...  ECDSA Threshold Signature Schemes With a 2-of-2 threshold signature scheme, the two parties, i.e., the user and the exchange, are both required to cooperate during day-to-day operations, i.e., generate  ... 
arXiv:2106.10972v1 fatcat:v7usx3wkuzfppopkap3svfe4oe

Fast Secure Two-Party ECDSA Signing [chapter]

Yehuda Lindell
2017 Lecture Notes in Computer Science  
Our protocol is proven secure under standard assumptions using a game-based definition. In addition, we prove security by simulation under a plausible yet non-standard assumption regarding Paillier.  ...  In this paper, we consider the specific case of two parties (and thus no honest majority) and construct a protocol that is approximately two orders of magnitude faster than the previous best.  ...  Acknowledgements We would like to than Valery Osheter from Dyadic Security for the implementation of ECDSA protocol and for running the experiments.  ... 
doi:10.1007/978-3-319-63715-0_21 fatcat:lvtragov3bcu3d3qfivdcemsce

Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations [chapter]

Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2019 Lecture Notes in Computer Science  
For the two party case, Lindell [Lin17] recently managed to get an efficient solution which, to achieve simulation-based security, relies on an interactive, non standard, assumption on Paillier's cryptosystem  ...  ECDSA is a widely adopted digital signature standard.  ...  Two-Party ECDSA from Hash Proof Systems In this section we provide a generic construction for two-party ECDSA signing from hash proof systems (HPS) which we prove secure in the simulation based model.  ... 
doi:10.1007/978-3-030-26954-8_7 fatcat:3vneyccogvdzbfjhezuk4klzua

Authentication and consensus overhead in vehicular ad hoc networks

Jonathan Petit, Zoubir Mammeri
2011 Telecommunications Systems  
A main challenge is to resist to various malicious abuses and security attacks. However, any security mechanism comes with overhead.  ...  We analyze how the authentication algorithm ECDSA and the consensus mechanism impact the vehicular network performance and the braking distance.  ...  Our work is based on the decision method "majority of Freshest X with Threshold". According to [8] , an important issue is the determination of the two parameters X and Threshold.  ... 
doi:10.1007/s11235-011-9589-y fatcat:oxs4yopdtvco7be3ohzwj7viam

Efficient and Secure ECDSA Algorithm and its Applications: A Survey [article]

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2019 arXiv   pre-print
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different  ...  This paper presents detailed and a comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications.  ...  They argued that ECDSA and threshold signatures solved Bitcoin security problems such as monitoring transaction details (block chain public) and transaction size.  ... 
arXiv:1902.10313v1 fatcat:7k44pfghujbzdmoxpkynavzone

Privacy Preserving Association Rule Mining in Distributed Environments using Fp-Growth Algorithm and Elliptic Curve Cryptography

T. Nusrat Jabeen, M. Chidambaram
2017 Indian Journal of Science and Technology  
This method uses associative third party, which is the central authority, holding common cryptographic keys of all the sites and responsible for performing distributed ARM.  ...  ECDSA, which is the abbreviation for Elliptic Curve based Digital Signature Algorithm, is used to provide authentication between two parties in unsecured environments.  ...  Secure two party association rule mining algorithm 8 . Here homomorphic encryption based solution is provided that produces more accurate results than data perturbation while maintaining accuracy.  ... 
doi:10.17485/ijst/2016/v9i48/93737 fatcat:ytx4swttirddfg6ypbhm44mjmq

On the performance, feasibility, and use of forward-secure signatures

Eric Cronin, Sugih Jamin, Tal Malkin, Patrick McDaniel
2003 Proceedings of the 10th ACM conference on Computer and communication security - CCS '03  
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties digital signatures face  ...  However, no previous works have explored the practical performance of these proposed constructions in realworld applications, nor have they compared FSS to traditional, nonforward-secure, signatures in  ...  This again provides a stronger security guarantee (as it requires a weaker assumption -any implementation of one-way functions suffices).  ... 
doi:10.1145/948109.948130 dblp:conf/ccs/CroninJMM03 fatcat:6vqdvgxooradrewtzouzt5ssdy

On the performance, feasibility, and use of forward-secure signatures

Eric Cronin, Sugih Jamin, Tal Malkin, Patrick McDaniel
2003 Proceedings of the 10th ACM conference on Computer and communication security - CCS '03  
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties digital signatures face  ...  However, no previous works have explored the practical performance of these proposed constructions in realworld applications, nor have they compared FSS to traditional, nonforward-secure, signatures in  ...  This again provides a stronger security guarantee (as it requires a weaker assumption -any implementation of one-way functions suffices).  ... 
doi:10.1145/948129.948130 fatcat:v2vgus6ekfakroz5yah4auukuy

Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin [chapter]

Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan
2017 Lecture Notes in Computer Science  
However, this approach is not optimal for two reasons. First, it requires the third party to be actively involved in every transaction, even when there is no dispute.  ...  This dilemma is addressed in practice using a third party escrow service. However, we show that naive escrow protocols introduce both privacy and security issues.  ...  ECDSA threshold signatures Gennaro et al. presented an ECDSA threshold signature scheme in [27] .  ... 
doi:10.1007/978-3-319-70972-7_18 fatcat:vizfsolk35fz7mjd42cicgmrka

A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things [article]

Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang, Abid Khan
2021 arXiv   pre-print
We demonstrate the security of our scheme and its resilience to secure clone node attack detection by conducting a comprehensive security analysis.  ...  the deployed environment to locate them securely.  ...  Assumptions about the Network Model • The Gateway node is a trusted third party which provides the secure interaction between IoT devices and system. • The Gateway node maintains its role as the central  ... 
arXiv:2106.15890v1 fatcat:afptp7nvlvczddsugyfakv6e6q

Threshold ECDSA with an Offline Recovery Party [article]

Michele Battagliola, Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2021 arXiv   pre-print
Starting from the threshold schemes for the ECDSA signature due to R. Gennaro and S.  ...  Following well-established approaches, we prove our scheme secure against adaptive malicious adversaries.  ...  Part of the results presented here have been carried on within the EU-ESF activities, call PON Ricerca e Innovazione 2014-2020, project Distributed Ledgers for Secure Open Communities.  ... 
arXiv:2007.04036v2 fatcat:5n2rmzsqrzamdbylowbp532e4e

CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS-SIMULATION USING NS2

Shivkumar
2014 American Journal of Applied Sciences  
The two major digital signature algorithms are Elliptic Curve Digital Signature Algorithm (ECDSA) which is the elliptic curve analogue of the Digital Signature Algorithm (DSA) and RSA algorithm.  ...  The two algorithms are used for generating the certificates exchanged between computer systems. Elliptic curve based systems can give better security compared to RSA with less key size.  ...  The private key is given only to the requesting party and the public key is made publicly available (as part of a digital certificate) in a directory that all parties can access.  ... 
doi:10.3844/ajassp.2014.171.179 fatcat:etivtwaf25hhthqvfduq2og75i

Secure and anonymous decentralized Bitcoin mixing

Jan Henrik Ziegeldorf, Roman Matzutt, Martin Henze, Fred Grossmann, Klaus Wehrle
2018 Future generations computer systems  
We analyze the security properties of our protocol and evaluate its efficiency.  ...  However, transactions from input to output addresses of the Bitcoin users are observed to be linkable, therefore, missing unlinkability as an important requirement of anonymity.  ...  A serious efficiency drawback in CoinParty is that, the protocol requires the mixing peers to invoke the threshold ECDSA key generation protocol and the threshold ECDSA digital signature protocol for every  ... 
doi:10.1016/j.future.2016.05.018 fatcat:bpvfxjuxdvanzglqsp7p3j2oty

LNGate: Powering IoT with Next Generation Lightning Micro-payments using Threshold Cryptography [article]

Ahmet Kurt, Suat Mercan, Omer Shlomovits, Enes Erdin, Kemal Akkaya
2021 arXiv   pre-print
This delegation approach is powered by a (2,2)-threshold scheme that requires the IoT device and the LN gateway to jointly perform all LN operations which in turn secures both parties' funds.  ...  To the best of our knowledge, this is the first work that implemented threshold cryptography in LN.  ...  In the next section, we briefly explain the ECDSA signature scheme. The details of the 2-party ECDSA threshold key generation and signing that we employ in our protocol are given at Appendix B and C.  ... 
arXiv:2105.08902v2 fatcat:zsb6uovs4zhgtl3h27cvnc7jna

Fast Multiparty Threshold ECDSA with Fast Trustless Setup

Rosario Gennaro, Steven Goldfeder
2018 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18  
While there exist previous threshold schemes for the ECDSA signature scheme, we are the first protocol that supports multiparty signatures for any t ≤ n with an efficient dealerless key generation.  ...  We prove our scheme secure against malicious adversaries with a dishonest majority. We implemented our protocol, demonstrating its efficiency and suitability to be deployed in practice.  ...  Crucially, the funds will remain secure even if up to t of these servers are compromised. The study of DSA/ECDSA threshold signature schemes predates Bitcoin. Gennaro et al.  ... 
doi:10.1145/3243734.3243859 dblp:conf/ccs/GennaroG18 fatcat:66n7x2tborepvg5pdi2gleep5u
« Previous Showing results 1 — 15 out of 376 results