基于遗忘传输的可验证阈值倍增协议

S. Ng, Tomás Tauber, Leslie Cheung
{"title":"基于遗忘传输的可验证阈值倍增协议","authors":"S. Ng, Tomás Tauber, Leslie Cheung","doi":"10.1109/CSP58884.2023.00029","DOIUrl":null,"url":null,"abstract":"Shamir Secrets Sharing (SSS) is a foundational element of many Multi-Party Computation (MPC) protocols. Although SSS has the ability to handle linear combinations of multiple secrets natively, its ability to handle the multiplication of secrets is limited. In general, the multiplication of secrets requires more participants, due to the increased “degree”. In this paper, we present a verifiable method for handling the multiplication of SSS without increasing its degree. Our method is based on the Gilboa Protocol or its variants, which are built on top of Oblivious Transfer (OT). We also provide a security analysis, demonstrating that the method is secure under the assumption of a malicious adversary security model. As an application use case, we present a new ECDSA threshold signature scheme built on top of our method.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Verifiable Threshold Multiplication Protocol based on Oblivious Transfer\",\"authors\":\"S. Ng, Tomás Tauber, Leslie Cheung\",\"doi\":\"10.1109/CSP58884.2023.00029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Shamir Secrets Sharing (SSS) is a foundational element of many Multi-Party Computation (MPC) protocols. Although SSS has the ability to handle linear combinations of multiple secrets natively, its ability to handle the multiplication of secrets is limited. In general, the multiplication of secrets requires more participants, due to the increased “degree”. In this paper, we present a verifiable method for handling the multiplication of SSS without increasing its degree. Our method is based on the Gilboa Protocol or its variants, which are built on top of Oblivious Transfer (OT). We also provide a security analysis, demonstrating that the method is secure under the assumption of a malicious adversary security model. As an application use case, we present a new ECDSA threshold signature scheme built on top of our method.\",\"PeriodicalId\":255083,\"journal\":{\"name\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSP58884.2023.00029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

Shamir秘密共享(SSS)是许多多方计算(MPC)协议的基础元素。虽然SSS本身具有处理多个秘密线性组合的能力,但其处理秘密乘法的能力有限。一般来说,由于“度”的增加,秘密的倍增需要更多的参与者。在本文中,我们提出了一种可验证的方法来处理SSS的乘法而不增加其次数。我们的方法基于Gilboa协议或其变体,它们构建在遗忘传输(OT)之上。我们还提供了安全性分析,证明该方法在恶意对手安全模型的假设下是安全的。作为一个应用案例,我们提出了一个新的ECDSA阈值签名方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Verifiable Threshold Multiplication Protocol based on Oblivious Transfer
Shamir Secrets Sharing (SSS) is a foundational element of many Multi-Party Computation (MPC) protocols. Although SSS has the ability to handle linear combinations of multiple secrets natively, its ability to handle the multiplication of secrets is limited. In general, the multiplication of secrets requires more participants, due to the increased “degree”. In this paper, we present a verifiable method for handling the multiplication of SSS without increasing its degree. Our method is based on the Gilboa Protocol or its variants, which are built on top of Oblivious Transfer (OT). We also provide a security analysis, demonstrating that the method is secure under the assumption of a malicious adversary security model. As an application use case, we present a new ECDSA threshold signature scheme built on top of our method.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信