Threshold ECDSA with an Offline Recovery Party

07/08/2020
by   Michele Battagliola, et al.
0

A (t,n)- threshold signature scheme enables distributed signing among n players such that any subgroup of size t can sign, whereas any group with fewer players cannot. Our goal is to produce signatures that are compatible with an existing centralized signature scheme: the key generation and signature algorithm are replaced by a communication protocol between the parties, but the verification algorithm remains identical to that of a signature issued using the centralized algorithm. Starting from the threshold schemes for the ECDSA signature due to R. Gennaro and S. Goldfeder, we present the first protocol that supports multiparty signatures with an offline participant during the Key Generation Phase, without relying on a trusted third party. Following well-established approaches, we prove our scheme secure against adaptive malicious adversaries.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/02/2020

A Provably-Unforgeable Threshold EdDSA with an Offline Recovery Party

A (t,n)-threshold signature scheme enables distributed signing among n p...
research
12/24/2019

On the Decentralized Generation of theRSA Moduli in Multi-Party Settings

RSA cryptography is still widely used. Some of its applications (e.g., d...
research
01/20/2023

Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations

Multi-signature is a protocol where a set of signatures jointly sign a m...
research
07/09/2022

At the Intersection of Deep Learning and Conceptual Art: The End of Signature

MIT wanted to commission a large scale artwork that would serve to 'illu...
research
08/17/2020

Certificate and Signature Free Anonymity for V2V Communications

Anonymity is a desirable feature for vehicle-to-vehicle (V2V) communicat...
research
05/30/2021

Reflow: Zero Knowledge Multi Party Signatures with Application to Distributed Authentication

Reflow is a novel signature scheme supporting unlinkable signatures by m...
research
10/01/2021

Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges

Currently, one of the most widely used protocols to secure cryptocurrenc...

Please sign up or login with your details

Forgot password? Click here to reset