Wenjing Cheng;Qi Feng;Chenkai Zeng;Yu Peng;Min Luo;Xiaolin Yang;Qingcai Luo
{"title":"Efficient Three-Party ECDSA Signature Based on Replicated Secret Sharing With Identifiable Abort","authors":"Wenjing Cheng;Qi Feng;Chenkai Zeng;Yu Peng;Min Luo;Xiaolin Yang;Qingcai Luo","doi":"10.1109/TIFS.2025.3607264","DOIUrl":null,"url":null,"abstract":"The private key is the only credential that can control and access account assets in the blockchain. Once the private key is leaked or stolen, the user loses control of the assets. The current mainstream solution is a threshold signature scheme based on secure multi-party computation, which can privately calculate the signature value without recovering the complete private key. However, most existing solutions are based on homomorphic or oblivious transmission, which have problems such as large computational or communication overhead and complex implementation. We designed a threshold signature scheme that relies only on zero-knowledge proofs and pseudo-random functions, and extended the identifiable abort mechanism to hold the corrupted party accountable afterwards. We implemented the new protocol based on the miracl library. The time cost for the key generation phase is 19.23ms, the communication cost is 96 bytes, and the signature phase is 21.41ms, the communication cost is 608 bytes. The overall time is about 81.61% faster than Lindell’18 and about 37.95% faster than DKLs’19.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"9539-9551"},"PeriodicalIF":8.0000,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11153554/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
The private key is the only credential that can control and access account assets in the blockchain. Once the private key is leaked or stolen, the user loses control of the assets. The current mainstream solution is a threshold signature scheme based on secure multi-party computation, which can privately calculate the signature value without recovering the complete private key. However, most existing solutions are based on homomorphic or oblivious transmission, which have problems such as large computational or communication overhead and complex implementation. We designed a threshold signature scheme that relies only on zero-knowledge proofs and pseudo-random functions, and extended the identifiable abort mechanism to hold the corrupted party accountable afterwards. We implemented the new protocol based on the miracl library. The time cost for the key generation phase is 19.23ms, the communication cost is 96 bytes, and the signature phase is 21.41ms, the communication cost is 608 bytes. The overall time is about 81.61% faster than Lindell’18 and about 37.95% faster than DKLs’19.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features