Filters








50 Hits in 3.5 sec

Improving security for users of decentralized exchanges through multiparty computation [article]

Robert Annessi, Ethan Fast
2021 arXiv   pre-print
This paper introduces a protocol based upon multiparty computation that allows for the creation of API keys and security policies that can be applied to any existing decentralized exchange.  ...  Our protocol works with both ECDSA and EdDSA signature schemes and prioritizes efficient computation and communication.  ...  In any case, for our protocol, a 2of-2 ECDSA threshold signature scheme is sufficient, and we continue our evaluation of the three candidate schemes.  ... 
arXiv:2106.10972v1 fatcat:v7usx3wkuzfppopkap3svfe4oe

Supporting Multiparty Signing over Named Data Networking [article]

Zhiyi Zhang, Siqi Liu, Randy King, Lixia Zhang
2021 arXiv   pre-print
Modern digitally controlled systems require multiparty authentication and authorization to meet the desired security requirement.  ...  This paper describes the design and development of NDN-MPS, an automated solution to support multiparty signature signing and verification for NDN-enabled applications.  ...  non-interactive multisignature schemes like MSP multisignature [3] and the Bitcoin ECDSA threshold signature [9, 10] .  ... 
arXiv:2106.04030v1 fatcat:e3xw4ps7anfuxeiz2e65qohiym

Fast Secure Two-Party ECDSA Signing [chapter]

Yehuda Lindell
2017 Lecture Notes in Computer Science  
In this paper, we consider the specific case of two parties (and thus no honest majority) and construct a protocol that is approximately two orders of magnitude faster than the previous best.  ...  Unlike other schemes like RSA, Schnorr signatures and more, it is particularly hard to construct efficient threshold signature protocols for ECDSA (and DSA).  ...  Acknowledgements We would like to than Valery Osheter from Dyadic Security for the implementation of ECDSA protocol and for running the experiments.  ... 
doi:10.1007/978-3-319-63715-0_21 fatcat:lvtragov3bcu3d3qfivdcemsce

Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations [chapter]

Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2019 Lecture Notes in Computer Science  
For the two party case, Lindell [Lin17] recently managed to get an efficient solution which, to achieve simulation-based security, relies on an interactive, non standard, assumption on Paillier's cryptosystem  ...  ECDSA is a widely adopted digital signature standard.  ...  This work was supported by the Universita' degli Studi di Catania,"Piano della Ricerca 2016/2018 Linea di intervento 2", and the French ANR ALAMBIC project (ANR-16-CE39-0006).  ... 
doi:10.1007/978-3-030-26954-8_7 fatcat:3vneyccogvdzbfjhezuk4klzua

Fast Multiparty Threshold ECDSA with Fast Trustless Setup

Rosario Gennaro, Steven Goldfeder
2018 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18  
While there exist previous threshold schemes for the ECDSA signature scheme, we are the first protocol that supports multiparty signatures for any t ≤ n with an efficient dealerless key generation.  ...  A threshold signature scheme enables distributed signing among n players such that any subgroup of size t + 1 can sign, whereas any group with t or fewer players cannot.  ...  [22] ), they are far from scalable and efficient. To our knowledge the protocol from [22] has never been implemented for the malicious multiparty case.  ... 
doi:10.1145/3243734.3243859 dblp:conf/ccs/GennaroG18 fatcat:66n7x2tborepvg5pdi2gleep5u

Secure and anonymous decentralized Bitcoin mixing

Jan Henrik Ziegeldorf, Roman Matzutt, Martin Henze, Fred Grossmann, Klaus Wehrle
2018 Future generations computer systems  
However, transactions from input to output addresses of the Bitcoin users are observed to be linkable, therefore, missing unlinkability as an important requirement of anonymity.  ...  Our protocol provides better protection for the participating peers against malicious behavior of minority of the peers and protection against the most serious sabotage attack attempted by any number of  ...  In this case according to secure multiparty computations (SMC) settings, the protocol execution continue normally.  ... 
doi:10.1016/j.future.2016.05.018 fatcat:bpvfxjuxdvanzglqsp7p3j2oty

LNGate: Powering IoT with Next Generation Lightning Micro-payments using Threshold Cryptography [article]

Ahmet Kurt, Suat Mercan, Omer Shlomovits, Enes Erdin, Kemal Akkaya
2021 arXiv   pre-print
To the best of our knowledge, this is the first work that implemented threshold cryptography in LN.  ...  This delegation approach is powered by a (2,2)-threshold scheme that requires the IoT device and the LN gateway to jointly perform all LN operations which in turn secures both parties' funds.  ...  ACKNOWLEDGMENTS We thank Christian Decker (@Snyke) and Lisa Neigut (@niftynei) for their inputs during the implementation efforts. This work was partially funded by the Cisco Foundation.  ... 
arXiv:2105.08902v2 fatcat:zsb6uovs4zhgtl3h27cvnc7jna

Threshold ECDSA with an Offline Recovery Party [article]

Michele Battagliola, Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2021 arXiv   pre-print
Starting from the threshold schemes for the ECDSA signature due to R. Gennaro and S.  ...  Goldfeder, we present the first protocol that supports multiparty signatures with an offline participant during the Key Generation Phase, without relying on a trusted third party.  ...  the work.  ... 
arXiv:2007.04036v2 fatcat:5n2rmzsqrzamdbylowbp532e4e

Resilient Custody of Crypto-Assets, and Threshold Multisignatures

Vincenzo Di Nicola, Riccardo Longo, Federico Mazzone, Gaetano Russo
2020 Mathematics  
Then we delve deeper into some interesting schemes based on secure multiparty computation, which give a blockchain-agnostic solution that balances security, safety, and transactional ease of use, and in  ...  Ensuring safe custody of crypto-assets, while at the same time allowing a user to easily access and transfer them, is one of the biggest challenges of this nascent industry.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/math8101773 fatcat:wz3ckmqmxzaqveipkbkowbcb2a

Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin [chapter]

Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan
2017 Lecture Notes in Computer Science  
There is an inherent circular dependency: should the buyer trust the seller and pay before receiving the goods or should the seller trust the buyer and ship the goods before receiving payment?  ...  In this model, the buyer transfers the payment to a trusted third party who only transfers it to the seller once it has ascertained that the product was delivered.  ...  Steven Goldfeder is supported by the NSF Graduate Research Fellowship under grant number DGE 1148900. Rosario Gennaro is supported by NSF Grant 1545759.  ... 
doi:10.1007/978-3-319-70972-7_18 fatcat:vizfsolk35fz7mjd42cicgmrka

Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security [chapter]

Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
2016 Lecture Notes in Computer Science  
Bitcoin thefts are on the rise, and threshold DSA is necessary to secure Bitcoin wallets.  ...  Due to the properties of DSA, it is far more difficult to create a threshold scheme for it than for other signature algorithms.  ...  Yet no general DSA threshold scheme existed that did not suffer from these setbacks. In Appendix A, we sketch how to extend Mackenzie and Reiter to the multiparty case.  ... 
doi:10.1007/978-3-319-39555-5_9 fatcat:hvws7ymevzhghhitjmfrh5ugsm

A Provably-Unforgeable Threshold EdDSA with an Offline Recovery Party [article]

Michele Battagliola and Riccardo Longo and Alessio Meneghetti and Massimiliano Sala
2022 arXiv   pre-print
Starting from the threshold scheme for the ECDSA signature due to Battagliola et al., we present the first protocol that supports EdDSA multi-party signatures with an offline participant during the key-generation  ...  The goal is to produce threshold digital signatures that are compatible with an existing centralized signature scheme.  ...  The second and the third authors are members of the INdAM Research group GNSAGA. The first author acknowledges support from TIM S.p.A. through the PhD scholarship.  ... 
arXiv:2009.01631v2 fatcat:nodgmtf2g5gu5btojv5ifypa7i

Privacy Preserving and Resilient RPKI [article]

Kris Shrishak, Haya Shulman
2021 arXiv   pre-print
In this work, we propose the first distributed RPKI system, based on threshold signatures, that requires the coordination of a number of RIRs to make changes to RPKI objects; hence, preventing unilateral  ...  The threat of IP prefix takedowns is one of the factors hindering RPKI adoption.  ...  Secure computing of ECDSA signatures does not only require the secret key sk to remain secret from all the parties but also the instance key k.  ... 
arXiv:2102.02456v1 fatcat:dprilk34xncc5i7e6chqwptfhy

Secure multiparty computation

Yehuda Lindell
2020 Communications of the ACM  
key insights ˽ Secure multiparty computation (MPC) is an extremely powerful tool, enabling parties to jointly compute on private inputs without revealing anything but the result. ˽ MPC has been studied  ...  In the past decade, huge progress has been made toward making MPC efficient enough for use in practice.  ...  Recently, there has been a lot of interest in threshold ECDSA due to its applications to protecting cryptocurrencies. 14, 17, 26, 27 Dishonest-majority MPC.  ... 
doi:10.1145/3387108 fatcat:rmmffttaqvgpvhao7xjwzskra4

DiLizium: A Two-Party Lattice-Based Signature Scheme

Jelizaveta Vakarjuk, Nikita Snetkov, Jan Willemson
2021 Entropy  
Our scheme is constructed from a variant of the Crystals-Dilithium post-quantum signature scheme.  ...  This allows for more efficient two-party implementation compared with the original but still derives its post-quantum security directly from the Module Learning With Errors and Module Short Integer Solution  ...  Recent interest in threshold versions of ECDSA has been influenced by applications in blockchains.  ... 
doi:10.3390/e23080989 fatcat:rv4dezl7lrebpo2rntfbrpcvia
« Previous Showing results 1 — 15 out of 50 results