Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain
【Author】 Feng, Qi; Yang, Kang; Ma, Mimi; He, Debiao
【Source】IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
【影响因子】7.231
【Abstract】The security of secret keys for blockchain-based applications is increasingly important, partly because the theft of secret keys will render a significant financial loss. To guarantee the security of secret keys, many multi-party signature protocols have been proposed. However, few of them are designed for EdDSA-based blockchain that is developing in growth. The folklore and the NIST document for standardizing threshold schemes believe that a distributed hash evaluation is required to design multi-party EdDSA protocols, which leads to a relatively large overhead. In this paper, we present two practical multi-party EdDSA protocols for semi-honest and malicious settings. Our protocols eliminate the distributed hashing by securely maintaining a global state, which is feasible for EdDSA-based blockchain. Furthermore, we extend the malicious protocol to resist DoS attacks by identifying corrupted parties in case of execution aborts. We implemented our EdDSA protocols for different parties using Alibaba cloud servers with all instances of type ecs.t5-c1m2.large. Our protocol in the malicious setting takes 1.51-15.3 ms between 2 parties and 5 parties, and are two orders of magnitude faster than the recent threshold EdDSA protocol. These properties (efficient, identifiable abort, high compatibility) make the two protocols ideal for threshold wallets for EdDSA-based cryptocurrency.
【Keywords】Protocols; Security; Blockchains; Cryptocurrency; Mobile handsets; Servers; NIST; Multi-party computation; EdDSA; identifiable abort; key confidentiality; cryptocurrency; blockchain
【发表时间】2023
【收录时间】2023-04-27
【文献类型】理论模型
【主题类别】
区块链技术-协同技术-密码学
评论