Fast two-party signature for upgrading ECDSA to two-party scenario easily

被引:1
|
作者
Tu, Binbin [1 ,2 ,3 ,4 ]
Chen, Yu [1 ,2 ,3 ]
Cui, Hongrui [5 ]
Wang, Xianfang [4 ]
机构
[1] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao 266237, Peoples R China
[4] CETC Cyberspace Secur Technol Co Ltd, Beijing 100070, Peoples R China
[5] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Two-party signature; ECDSA; Combinatorial ECDSA; Signing key protection;
D O I
10.1016/j.tcs.2023.114325
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
ECDSA is a standardized signature scheme and is widely used in many fields. However, most two-party ECDSA require a complicated multi-party computation technique to compute the multiplication of many shared secrets and necessitate expensive zero-knowledge proofs to deal with malicious adversaries.In this paper, we propose a simple yet fast two-party signing protocol based on ECDSA security, whose signing operation of each party is similar to the original ECDSA signing algorithm. Our protocol can enjoy the same efficiency as ECDSA and upgrades the existing ECDSA application to two-party scenario friendly. For this purpose, we first introduce a variant of ECDSA called combinatorial ECDSA, which is as secure as the standard ECDSA and can be easily divided into two parts. Then, we devise a two-party signing protocol without complicated multi-party computation from the combinatorial ECDSA and give the security proof based on ECDSA. Compared with the state-of-the-art two-party ECDSA, the signing result of each party in our protocol maintains the structure of ECDSA signature, which can be verified easily and avoids expensive zero-knowledge proofs. Last, we conduct an experimental evaluation, demonstrating that the performance of our combinatorial ECDSA and two-party signature is similar to ECDSA and the experimental results show that our proposed schemes are practical.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Fast Secure Two-Party ECDSA Signing
    Lindell, Yehuda
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [2] Fast Secure Two-Party ECDSA Signing
    Yehuda Lindell
    [J]. Journal of Cryptology, 2021, 34
  • [3] Fast Secure Two-Party ECDSA Signing
    Lindell, Yehuda
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 613 - 644
  • [4] Secure and efficient two-party ECDSA signature scheme
    Wang, Jing
    Wu, Libing
    Luo, Min
    He, Debiao
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (02): : 12 - 25
  • [5] Efficient Online-friendly Two-Party ECDSA Signature
    Xue, Haiyang
    Au, Man Ho
    Xie, Xiang
    Yuen, Tsz Hon
    Cui, Handong
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 558 - 573
  • [6] An Efficient Two-Party ECDSA Scheme for Cryptocurrencies
    Syed, Habeeb
    Paul, Arinjita
    Singh, Meena
    Rajan, Ma
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 411 - 430
  • [7] Secure Two-party Threshold ECDSA from ECDSA Assumptions
    Doemer, Jack
    Kondi, Yashvanth
    Lee, Eysa
    Shelat, Abhi
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 980 - 997
  • [8] A Two-Party South?
    Silva, Ruth C.
    [J]. POLITICAL SCIENCE QUARTERLY, 1952, 67 (04) : 624 - 626
  • [9] A TWO-PARTY SOUTH?
    Heberle, Rudolf
    [J]. SOCIAL FORCES, 1952, 31 (01) : 84 - 85
  • [10] A Two-Party South?
    Shannon, J. B.
    [J]. AMERICAN POLITICAL SCIENCE REVIEW, 1952, 46 (03) : 880 - 882