{"title":"Verifiable Threshold Multiplication Protocol based on Oblivious Transfer","authors":"S. Ng, Tomás Tauber, Leslie Cheung","doi":"10.1109/CSP58884.2023.00029","DOIUrl":null,"url":null,"abstract":"Shamir Secrets Sharing (SSS) is a foundational element of many Multi-Party Computation (MPC) protocols. Although SSS has the ability to handle linear combinations of multiple secrets natively, its ability to handle the multiplication of secrets is limited. In general, the multiplication of secrets requires more participants, due to the increased “degree”. In this paper, we present a verifiable method for handling the multiplication of SSS without increasing its degree. Our method is based on the Gilboa Protocol or its variants, which are built on top of Oblivious Transfer (OT). We also provide a security analysis, demonstrating that the method is secure under the assumption of a malicious adversary security model. As an application use case, we present a new ECDSA threshold signature scheme built on top of our method.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Shamir Secrets Sharing (SSS) is a foundational element of many Multi-Party Computation (MPC) protocols. Although SSS has the ability to handle linear combinations of multiple secrets natively, its ability to handle the multiplication of secrets is limited. In general, the multiplication of secrets requires more participants, due to the increased “degree”. In this paper, we present a verifiable method for handling the multiplication of SSS without increasing its degree. Our method is based on the Gilboa Protocol or its variants, which are built on top of Oblivious Transfer (OT). We also provide a security analysis, demonstrating that the method is secure under the assumption of a malicious adversary security model. As an application use case, we present a new ECDSA threshold signature scheme built on top of our method.