Bandwidth-Efficient Threshold EC-DSA
hal.structure.identifier | Lithe and fast algorithmic number theory [LFANT] | |
dc.contributor.author | CASTAGNOS, Guilhem | |
hal.structure.identifier | Dipartimento di Matematica e Informatica [DMI] | |
dc.contributor.author | CATALANO, Dario | |
hal.structure.identifier | Arithmetic and Computing [ARIC] | |
dc.contributor.author | LAGUILLAUMIE, Fabien | |
hal.structure.identifier | Dipartimento di Matematica e Informatica [DMI] | |
hal.structure.identifier | Scuola Superiore di Catania | |
dc.contributor.author | SAVASTA, Federico | |
hal.structure.identifier | Arithmetic and Computing [ARIC] | |
dc.contributor.author | TUCKER, Ida | |
dc.date.accessioned | 2024-04-04T02:49:40Z | |
dc.date.available | 2024-04-04T02:49:40Z | |
dc.date.issued | 2020-04-29 | |
dc.date.conference | 2020-06-01 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/191841 | |
dc.description.abstractEn | Threshold Signatures allow n parties to share the power of issuing digital signatures so that any coalition of size at least t+1 can sign, whereas groups of t or less players cannot. Over the last few years many schemes addressed the question of realizing efficient threshold variants for the specific case of EC-DSA signatures. In this paper we present new solutions to the problem that aim at reducing the overall bandwidth consumption. Our main contribution is a new variant of the Gennaro and Goldfeder protocol from ACM CCS 2018 that avoids all the required range proofs, while retaining provable security against malicious adversaries in the dishonest majority setting. Our experiments show that-for all levels of security-our signing protocol reduces the bandwidth consumption of best previously known secure protocols for factors varying between 4.4 and 9, while key generation is consistently two times less expensive. Furthermore compared to these same protocols, our signature generation is faster for 192-bits of security and beyond. | |
dc.description.sponsorship | AppLicAtions de la MalléaBIlité en Cryptographie - ANR-16-CE39-0006 | |
dc.language.iso | en | |
dc.publisher | Springer International Publishing | |
dc.title.en | Bandwidth-Efficient Threshold EC-DSA | |
dc.type | Communication dans un congrès | |
dc.identifier.doi | 10.1007/978-3-030-45388-6_10 | |
dc.subject.hal | Informatique [cs]/Cryptographie et sécurité [cs.CR] | |
bordeaux.page | 266-296 | |
bordeaux.hal.laboratories | Institut de Mathématiques de Bordeaux (IMB) - UMR 5251 | * |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.conference.title | PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography | |
bordeaux.country | GB | |
bordeaux.conference.city | Edinburgh / Virtual | |
bordeaux.peerReviewed | oui | |
hal.identifier | hal-02944825 | |
hal.version | 1 | |
hal.invited | non | |
hal.proceedings | oui | |
hal.conference.end | 2020-06-04 | |
hal.popular | non | |
hal.audience | Internationale | |
hal.origin.link | https://hal.archives-ouvertes.fr//hal-02944825v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2020-04-29&rft.spage=266-296&rft.epage=266-296&rft.au=CASTAGNOS,%20Guilhem&CATALANO,%20Dario&LAGUILLAUMIE,%20Fabien&SAVASTA,%20Federico&TUCKER,%20Ida&rft.genre=unknown |
Fichier(s) constituant ce document
Fichiers | Taille | Format | Vue |
---|---|---|---|
Il n'y a pas de fichiers associés à ce document. |