Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain

被引:3
|
作者
Feng, Qi [1 ]
Yang, Kang [2 ]
Ma, Mimi [2 ,3 ]
He, Debiao [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Henan Univ Technol, Coll Informat Sci & Engn, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Protocols; Security; Blockchains; Cryptocurrency; Mobile handsets; Servers; NIST; Multi-party computation; EdDSA; identifiable abort; key confidentiality; cryptocurrency; blockchain;
D O I
10.1109/TIFS.2023.3256710
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of secret keys for blockchain-based applications is increasingly important, partly because the theft of secret keys will render a significant financial loss. To guarantee the security of secret keys, many multi-party signature protocols have been proposed. However, few of them are designed for EdDSA-based blockchain that is developing in growth. The folklore and the NIST document for standardizing threshold schemes believe that a distributed hash evaluation is required to design multi-party EdDSA protocols, which leads to a relatively large overhead. In this paper, we present two practical multi-party EdDSA protocols for semi-honest and malicious settings. Our protocols eliminate the distributed hashing by securely maintaining a global state, which is feasible for EdDSA-based blockchain. Furthermore, we extend the malicious protocol to resist DoS attacks by identifying corrupted parties in case of execution aborts. We implemented our EdDSA protocols for different parties using Alibaba cloud servers with all instances of type ecs.t5-c1m2.large. Our protocol in the malicious setting takes 1.51-15.3 ms between 2 parties and 5 parties, and are two orders of magnitude faster than the recent threshold EdDSA protocol. These properties (efficient, identifiable abort, high compatibility) make the two protocols ideal for threshold wallets for EdDSA-based cryptocurrency.
引用
收藏
页码:1937 / 1950
页数:14
相关论文
共 50 条
  • [21] Multi-Party Electronic Contract Signing Protocol Based on Blockchain
    Zhang, Tong
    Wang, Yujue
    Ding, Yong
    Wu, Qianhong
    Liang, Hai
    Wang, Huiyong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02): : 264 - 271
  • [22] Multi-Party Electronic Contract Signing Protocol Based on Blockchain
    Zhang, Tong
    Wang, Yujue
    Ding, Yong
    Wu, Qianhong
    Liang, Hai
    Wang, Huiyong
    IEICE Transactions on Information and Systems, 2022, E105D (02): : 264 - 271
  • [23] Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency
    Feng, Qi
    He, Debiao
    Luo, Min
    Li, Zengxiang
    Choo, Kim-Kwang Raymond
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 137 - 147
  • [24] Efficient multi-party computation with dispute control
    Beerliova-Trubiniova, Zuzana
    Hirt, Martin
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 305 - 328
  • [25] Efficient multi-party computation over rings
    Cramer, R
    Fehr, S
    Ishai, Y
    Kushilevitz, E
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 596 - 613
  • [26] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [27] Communication middleware for multi-party multimedia applications
    Ensor, JR
    Ahuja, SR
    BELL LABS TECHNICAL JOURNAL, 1997, 2 (01) : 74 - 85
  • [28] Efficient quantum secure multi-party greatest common divisor protocol and its applications in private set operations
    Li, Zi-Xian
    Liu, Wen-Jie
    Su, Bing-Mei
    EPJ QUANTUM TECHNOLOGY, 2024, 11 (01)
  • [29] Hybrid proxy multisignature: A new type multi-party signature
    Wang, Zecheng
    Qlan, Haifeng
    Li, Zhibin
    INFORMATION SCIENCES, 2007, 177 (24) : 5638 - 5650
  • [30] A Secure Multi-party Signature Scheme Based on Trust Mechanism
    Cheng, Yage
    Hu, Mingsheng
    Wang, Lipeng
    Lei, Yanfang
    Fu, Junjun
    Gong, Bei
    Ma, Wei
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 119 - 132