Threshold ECDSA w/ Identifiable Aborts Ran Canetti (Boston - - PowerPoint PPT Presentation

threshold ecdsa
SMART_READER_LITE
LIVE PREVIEW

Threshold ECDSA w/ Identifiable Aborts Ran Canetti (Boston - - PowerPoint PPT Presentation

UC Non-Interactive, Proactive, Threshold ECDSA w/ Identifiable Aborts Ran Canetti (Boston University), Rosario Gennaro (City College, CUNY), Steven Goldfeder (Cornell Tech), Nikolaos Makriyannis (Fireblocks), Udi Peled (Fireblocks) To appear


slide-1
SLIDE 1

UC Non-Interactive, Proactive, Threshold ECDSA w/ Identifiable Aborts

Ran Canetti (Boston University), Rosario Gennaro (City College, CUNY), Steven Goldfeder (Cornell Tech), Nikolaos Makriyannis (Fireblocks), Udi Peled (Fireblocks)

To appear in

CCS’20

slide-2
SLIDE 2

Background (MPC)

Secure Multiparty Computation Distrustful parties compute correlated outputs on their (secret) inputs and only reveal what the outputs suggest.  Powerful Feasibility Results

Yao’82, Goldreich-Micali-Widgerson’86, Chaum-Crepeau-Damgard’88, Ben Or-Goldwasser-Wigderson’88

 Any traditional signature scheme can be “thresholdized”, in principle  MPC theory is not a panacea

slide-3
SLIDE 3

Desiderata

  • Non-Interactive Signing

Signature generation boils down to a single message (w/ preprocess).

Especially relevant for “cold wallets”.

slide-4
SLIDE 4

Desiderata

  • Non-Interactive Signing

Signature generation boils down to a single message (w/ preprocess).

  • Accountability

Faulty/malicious signatories are identified in case of failure.

Known as security w/ identifiable abort in MPC literature.

slide-5
SLIDE 5

Desiderata

  • Non-Interactive Signing

Signature generation boils down to a single message (w/ preprocess).

  • Accountability

Faulty/malicious signatories are identified in case of failure.

  • Proactive Security

Long-haul security against adaptive adversaries.

Adaptive vs Static Adversaries

slide-6
SLIDE 6

Desiderata

  • Non-Interactive Signing

Signature generation boils down to a single message (w/ preprocess).

  • Accountability

Faulty/malicious signatories are identified in case of failure.

  • Proactive Security

Long-haul security against adaptive adversaries.

  • UC Security

Security preserved under composition.

Even when multiple different sessions are

  • ccurring simultaneously.
slide-7
SLIDE 7

Desiderata

  • Non-Interactive Signing

Signature generation boils down to a single message (w/ preprocess).

  • Accountability

Faulty/malicious signatories are identified in case of failure.

  • Proactive Security

Long-haul security against adaptive adversaries.

  • UC Security

Security preserved under composition.

We show how to achieve all of these properties in one protocol!

slide-8
SLIDE 8

Previous/Concurrent Work on t-ECDSA

Honest Majority:

Gennaro-Jarecki-Krawcyk-Rabin’96

Two-Party Dishonest Majority:

Mackenzie-Reiter’01 Lindell’17, Doerner-Shelat’18, Castagnos-Catalano-Laguillaumie-Savasta-Tucker’19

Multiparty Dishonest Majority:

Gennaro-Goldfeder-Narayanan’16, Boneh-Gennaro-Goldfeder’17 Lindell-Nof’19, Gennaro-Goldfeder’19, Doerner-Kondi-Lee-Shelat’20 Castagnos-Catalano-Laguillaumie-Savasta-Tucker’20

slide-9
SLIDE 9

Previous/Concurrent Work on t-ECDSA

Honest Majority:

Gennaro-Jarecki-Krawcyk-Rabin’96

Two-Party Dishonest Majority:

Mackenzie-Reiter’01 Lindell’17, Doerner-Shelat’18, Castagnos-Catalano-Laguillaumie-Savasta-Tucker’19

Multiparty Dishonest Majority:

Gennaro-Goldfeder-Narayanan’16, Boneh-Gennaro-Goldfeder’17 Lindell-Nof’19, Gennaro-Goldfeder’19, Doerner-Kondi-Lee-Shelat’20 Castagnos-Catalano-Laguillaumie-Savasta-Tucker’20 Dalskov-Keller-Orlandi-Shrishak-Shulman’20 Gagol-Kula-Straszak-Swietek’20 Damgard-Jakobsen-Nielsen-Pagter-Ostergaard’20

slide-10
SLIDE 10

Our Results

We present two related protocols for threshold ECDSA. Communication Model: We rely on synchronous broadcast channel

Key-Generation Key-Refresh Presigning Signing Key-Generation Key-Refresh Presigning Signing

Protocol 1 Protocol 2

slide-11
SLIDE 11

Our Results (cont’d)

PROTOCOL 1 PROTOCOL 2 Non-Interactive Signing ✔ ✔ Full Proactive Security ✔ ✔ Accountability ✔ ✔ UC - Security ✔ ✔

We present two related protocols for threshold ECDSA.

slide-12
SLIDE 12

Our Results (cont’d)

PROTOCOL 1 PROTOCOL 2 Non-Interactive Signing ✔ ✔ Full Proactive Security ✔ ✔ Accountability ✔ ✔ UC - Security ✔ ✔ Round-Complexity (Signing) 4 i.e. 3 + 1 7 i.e. 6 + 1 Accountability Overhead 𝑃(𝑜2) 𝑃(𝑜)

We present two related protocols for threshold ECDSA.

Overhead kicks in only when a fault is detected

slide-13
SLIDE 13

Comparison

Most Round-Efficient

slide-14
SLIDE 14

Comparison

Most Round-Efficient

slide-15
SLIDE 15

Comparison

Most Round-Efficient ~2 as expensive in comp & com compared to the most com-efficient protocols

slide-16
SLIDE 16
slide-17
SLIDE 17

Background

slide-18
SLIDE 18

Preliminaries (Notation)

For 𝑈 ∈ ℕ, let ±𝑈 denote {−𝑈, … , 0, … , 𝑈}. Non Standard Notation!! Index disappearance denotes summation e.g. if 𝑦𝑗, 𝑙𝑘, 𝜀ℓ … becomes 𝑦, 𝑙, 𝜀 … it means σ𝑗 𝑦𝑗 , σ𝑘 𝑙𝑘 , σℓ 𝜀ℓ … Also for double indices!

slide-19
SLIDE 19

Preliminaries (ECDSA)

  • Parameters:
  • (𝔿, 𝑕, 𝑟) group-generator-order and hash ℋ: {0,1}∗ → 𝔾𝑟.
  • Algorithms:
  • keygen() = 𝑦 ← 𝔾𝑟, 𝑌 = 𝑕𝑦∈ 𝔿
  • sign𝑦 msg = 𝑠, 𝜏 s.t.

𝑠 = 𝑕𝑙−1ȁx−axis and 𝜏 = 𝑙(𝑛 + 𝑠𝑦).

where 𝑙 ← 𝔾𝑟 and 𝑛 = ℋ(msg).

slide-20
SLIDE 20

where 𝑙 ← 𝔾𝑟 and 𝑛 = ℋ(msg).

Preliminaries (ECDSA)

  • Parameters:
  • (𝔿, 𝑕, 𝑟) group-generator-order and hash ℋ: {0,1}∗ → 𝔾𝑟.
  • Algorithms:
  • keygen() = 𝑦 ← 𝔾𝑟, 𝑌 = 𝑕𝑦∈ 𝔿
  • sign𝑦 msg = 𝑠, 𝜏 s.t.

𝑠 = 𝑕𝑙−1ȁx−axis and 𝜏 = 𝑙 ⋅ 𝑛 + 𝑠(𝑙 ⋅ 𝑦).

slide-21
SLIDE 21

where 𝑙 ← 𝔾𝑟 and 𝑛 = ℋ(msg).

Preliminaries (ECDSA)

  • Parameters:
  • (𝔿, 𝑕, 𝑟) group-generator-order and hash ℋ: {0,1}∗ → 𝔾𝑟.
  • Algorithms:
  • keygen() = 𝑦 ← 𝔾𝑟, 𝑌 = 𝑕𝑦∈ 𝔿
  • sign𝑦 msg = 𝑠, 𝜏 s.t.

𝑠 = 𝑕𝑙−1ȁx−axis and 𝜏 = 𝑙 ⋅ 𝑛 + 𝑠(𝑙 ⋅ 𝑦).

(Gist of) MPC sign: Sample shares 𝑙1 … 𝑙𝑜 of 𝑙 and compute shares of 𝑙 ⋅ 𝑦 via pairwise multiplication with 𝑦1 … 𝑦𝑜.

slide-22
SLIDE 22

Preliminaries (ECDSA)

  • Parameters:
  • (𝔿, 𝑕, 𝑟) group-generator-order and hash ℋ: {0,1}∗ → 𝔾𝑟.
  • Algorithms:
  • keygen() = 𝑦 ← 𝔾𝑟, 𝑌 = 𝑕𝑦∈ 𝔿
  • sign𝑦 msg = 𝑠, 𝜏 s.t.

𝑠 = 𝑕𝑙−1ȁx−axis and 𝜏 = 𝑙 ⋅ 𝑛 + 𝑠(𝑙 ⋅ 𝑦).

  • vrfy𝑌 msg; 𝑠, 𝜏 = 1 if and only if g𝑛 ⋅ 𝑌𝑠 𝜏−1ȁx−axis = 𝑠.

where 𝑙 ← 𝔾𝑟 and 𝑛 = ℋ(msg).

slide-23
SLIDE 23

Preliminaries (Paillier Encryption)

Easy to deduce 𝑛 knowing 𝜒(𝑂) Where 𝜍 ← ℤ𝑂

  • Algorithms:
  • keygen() = RSA Modulus & Factors (𝑂; 𝑞1, 𝑞2)
  • enc𝑂 𝑛 ∈ ℤ𝑂 = 1 + 𝑂 𝑛 ⋅ 𝜍𝑂 mod 𝑂2
  • dec𝜒(𝑂) 𝐷 ∈ ℤ𝑂2

=

C𝜒(𝑂)−1 mod 𝑂2 𝑂

⋅ 𝜚 𝑂 −1 mod 𝑂

slide-24
SLIDE 24

Preliminaries (Paillier Encryption)

  • Algorithms:
  • keygen() = RSA Modulus & Factors (𝑂; 𝑞1, 𝑞2)
  • enc𝑂 𝑛 ∈ ℤ𝑂 = 1 + 𝑂 𝑛 ⋅ 𝜍𝑂 mod 𝑂2
  • dec𝜒(𝑂) 𝐷 ∈ ℤ𝑂2

=

C𝜒(𝑂)−1 mod 𝑂2 𝑂

⋅ 𝜚 𝑂 −1 mod 𝑂

  • Paillier is additive homomorphic:

enc𝑂 𝑛1 + 𝑛2 = enc𝑂 𝑛1) ⋅ enc𝑂 (𝑛2 enc𝑂 𝛽 ⋅ 𝑛 = enc𝑂 𝑛 𝛽

Easy to deduce 𝑛 knowing 𝜒(𝑂) Where 𝜍 ← ℤ𝑂

slide-25
SLIDE 25

Preliminaries (Multiplication via Paillier)

𝒝 and ℬ wish to compute 𝑏, 𝑐 ↦ (𝑡1, 𝑡2) such that 𝑡1 + 𝑡2 = 𝑏 ⋅ 𝑐

  • 1. 𝒝 sends 𝐷 = enc(𝑏)
  • 2. ℬ samples 𝑡2 and replies with 𝐸 = 𝐷𝑐 ⋅ enc (−𝑡2)

Output: 𝒝 outputs 𝑡1 = dec (𝐸) and ℬ outputs 𝑡2.

dec(𝐸) = 𝑏𝑐 − 𝑡2 𝒝 is associated with Paillier public key 𝑂

slide-26
SLIDE 26

Protocol (Honest-But-Curious)

From 𝒬𝑗 perspective - Each 𝒬𝑗 holds secret key-share 𝑦𝑗

1. Sample 𝑙𝑗, 𝛿𝑗 ← 𝔾𝑟 and send 𝐿𝑗 = enc𝑗(𝑙𝑗) to all.

  • 2. For each 𝑘 ≠ 𝑗 do
  • Set 𝐸

𝑘,𝑗 = 𝐿 𝑘 𝑦𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 for 𝛾𝑗,𝑘 ← ±2ℓ ⋅ 𝑟

  • Set 𝐸

𝑘,𝑗 ′ = 𝐿 𝑘 𝛿𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 ′

for 𝛾𝑗,𝑘

′ ← ±2ℓ ⋅ 𝑟

Send (𝐸

𝑘,𝑗, 𝐸 𝑘,𝑗 ′ ) to 𝒬 𝑘.

  • 3. Set Γ

𝑗 = 𝑕𝛿𝑗 and send Γ 𝑗, 𝜀𝑗 to all

  • 4. Set 𝑆 =

ς𝑘 Γ

𝑘 𝜀−1

and send 𝜏𝑗 = 𝑙𝑗 𝑛 + 𝑠𝜓𝑗 to all.

Write 𝜓𝑗,𝑘 and 𝜀𝑗,𝑘 for 𝒬𝑗’s output in each mult. NB → 𝜀 = 𝑙 ⋅ 𝛿 and 𝜓 = 𝑙 ⋅ 𝑦

Output 𝑠, 𝜏 .

𝛿 ⋅ 𝜀−1 = 𝑙−1

slide-27
SLIDE 27

Malicious Security Challenges

We are embedding values of 𝔾𝑟 into ℤ𝑂 (𝑟 & 𝑂 are coprime) enc 𝛿 ⋅ 𝑙 + 𝛾 mod 𝑟 = enc 𝛿 ⋅ 𝑙 + 𝛾 mod 𝑟 In case of equality → signature verifies Otherwise → signature does not verify

Carefull choice of 𝛿 & 𝛾 reveals a bit of information per protocol execution.

(†)

slide-28
SLIDE 28

Malicious Security Challenges

We are embedding values of 𝔾𝑟 into ℤ𝑂 (𝑟 & 𝑂 are coprime) enc 𝛿 ⋅ 𝑙 + 𝛾 mod 𝑟 = enc 𝛿 ⋅ 𝑙 + 𝛾 mod 𝑟 In case of equality → signature verifies Otherwise → signature does not verify  Solution: Enforce a “range policy” on all secret data i.e. values can only be chosen from some range ±2ℓ ≪ 𝑂

Carefull choice of 𝛿 & 𝛾 reveals a bit of information per protocol execution.

(†)

ZK-Proofs for ℛ = 𝑂, 𝐷; 𝑦 𝐷 = enc𝑂 𝑦 ∧ 𝑦 ∈ ±2ℓ}

Also in Lindell-Nof’18 and Gennaro-Goldfeder’18

slide-29
SLIDE 29

Our Protocol(s)

slide-30
SLIDE 30

Our Protocol

Prove that 𝑙𝑗 is small. Prove that 𝐸

𝑘,𝑗 and 𝐸 𝑘,𝑗 ′ were

computed as prescribed using sm small ll values

1. Sample 𝑙𝑗, 𝛿𝑗 ← 𝔾𝑟 and send 𝐿𝑗 = enc𝑗(𝑙𝑗) to all.

  • 2. For each 𝑘 ≠ 𝑗 do
  • Set 𝐸

𝑘,𝑗 = 𝐿 𝑘 𝑦𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 for 𝛾𝑗,𝑘 ← ±2ℓ ⋅ 𝑟

  • Set 𝐸

𝑘,𝑗 ′ = 𝐿 𝑘 𝛿𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 ′

for 𝛾𝑗,𝑘

′ ← ±2ℓ ⋅ 𝑟

Send 𝐸

𝑘,𝑗, 𝐸 𝑘,𝑗 ′

to 𝒬

𝑘.

  • 3. Set Γ

𝑗 = 𝑕𝑙𝑗 and send Γ 𝑗, 𝜀𝑗 to all

  • 4. Set 𝑆 =

ς𝑘 Γ

𝑘 𝜀−1

and send 𝜏𝑗 = 𝑙𝑗 𝑛 + 𝑠𝜓𝑗 to all

Verify that 𝑆 is well-formed

slide-31
SLIDE 31

Our Protocol

Prove that 𝑙𝑗 is small. Prove that 𝐸

𝑘,𝑗 and 𝐸 𝑘,𝑗 ′ were

computed as prescribed using sm small ll values

NEW! Special algebraic check for 𝑆.

1. Sample 𝑙𝑗, 𝛿𝑗 ← 𝔾𝑟 and send 𝐿𝑗 = enc𝑗(𝑙𝑗) to all.

  • 2. For each 𝑘 ≠ 𝑗 do
  • Set 𝐸

𝑘,𝑗 = 𝐿 𝑘 𝑦𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 for 𝛾𝑗,𝑘 ← ±2ℓ ⋅ 𝑟

  • Set 𝐸

𝑘,𝑗 ′ = 𝐿 𝑘 𝛿𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 ′

for 𝛾𝑗,𝑘

′ ← ±2ℓ ⋅ 𝑟

Send 𝐸

𝑘,𝑗, 𝐸 𝑘,𝑗 ′

to 𝒬

𝑘.

  • 3. Set Γ

𝑗 = 𝑕𝑙𝑗 and send Γ 𝑗, 𝜀𝑗 to all

  • 4. Set 𝑆 =

ς𝑘 Γ

𝑘 𝜀−1

and send 𝜏𝑗 = 𝑙𝑗 𝑛 + 𝑠𝜓𝑗 to all

slide-32
SLIDE 32

1. Sample 𝑙𝑗, 𝛿𝑗 ← 𝔾𝑟 and send 𝐿𝑗 = enc𝑗(𝑙𝑗) to all.

  • 2. Set Γ

𝑗 = 𝑕𝛿𝑗 and for each 𝑘 ≠ 𝑗 do

  • Set 𝐸

𝑘,𝑗 = 𝐿 𝑘 𝑦𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 for 𝛾𝑗,𝑘 ← ±2ℓ ⋅ 𝑟

  • Set 𝐸

𝑘,𝑗 ′ = 𝐿 𝑘 𝛿𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 ′

for 𝛾𝑗,𝑘

′ ← ±2ℓ ⋅ 𝑟

Send Γ𝑗, 𝐸

𝑘,𝑗, 𝐸 𝑘,𝑗 ′

to 𝒬

𝑘.

  • 3. Set Δ𝑗 = ς𝑘 Γ

𝑘 𝑙𝑗 and send Δ𝑗, 𝜀𝑗 to all

  • 4. Set 𝑆 =

ς𝑘 Γ

𝑘 𝜀−1

and send 𝜏𝑗 = 𝑙𝑗 𝑛 + 𝑠𝜓𝑗 to all

Our Protocol

Prove that 𝑙𝑗 is small. Prove that 𝐸

𝑘,𝑗 and 𝐸 𝑘,𝑗 ′ were

computed as prescribed using sm small ll values

NEW! Special algebraic check for 𝑆.

slide-33
SLIDE 33

1. Sample 𝑙𝑗, 𝛿𝑗 ← 𝔾𝑟 and send 𝐿𝑗 = enc𝑗(𝑙𝑗) to all.

  • 2. Set Γ

𝑗 = 𝑕𝛿𝑗 and for each 𝑘 ≠ 𝑗 do

  • Set 𝐸

𝑘,𝑗 = 𝐿 𝑘 𝑦𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 for 𝛾𝑗,𝑘 ← ±2ℓ ⋅ 𝑟

  • Set 𝐸

𝑘,𝑗 ′ = 𝐿 𝑘 𝛿𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 ′

for 𝛾𝑗,𝑘

′ ← ±2ℓ ⋅ 𝑟

Send Γ𝑗, 𝐸

𝑘,𝑗, 𝐸 𝑘,𝑗 ′

to 𝒬

𝑘.

  • 3. Set Δ𝑗 = ς𝑘 Γ

𝑘 𝑙𝑗 and send Δ𝑗, 𝜀𝑗 to all

  • 4. Set 𝑆 =

ς𝑘 Γ

𝑘 𝜀−1

and send 𝜏𝑗 = 𝑙𝑗 𝑛 + 𝑠𝜓𝑗 to all

Our Protocol

Prove that 𝑙𝑗 is small. Prove that 𝐸

𝑘,𝑗 and 𝐸 𝑘,𝑗 ′ were

computed as prescribed using sm small ll values Prove that you use the right 𝑙𝑗.

Check that 𝑕𝜀 = ς𝑘 Δ𝑘

slide-34
SLIDE 34

Our Protocol

Prove that 𝑙𝑗 is small. Prove that 𝐸

𝑘,𝑗 and 𝐸 𝑘,𝑗 ′ were

computed as prescribed using sm small ll values

Check that 𝑕𝜀 = ς𝑘 Δ𝑘

Prove that you use the right 𝑙𝑗.

1. Sample 𝑙𝑗, 𝛿𝑗 ← 𝔾𝑟 and send 𝐿𝑗 = enc𝑗(𝑙𝑗) to all.

  • 2. Set Γ

𝑗 = 𝑕𝛿𝑗 and for each 𝑘 ≠ 𝑗 do

  • Set 𝐸

𝑘,𝑗 = 𝐿 𝑘 𝑦𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 and 𝐺 𝑘,𝑗 = enc𝑗 𝛾𝑗,𝑘

  • Set 𝐸

𝑘,𝑗 ′ = 𝐿 𝑘 𝛿𝑗 ⋅ enc𝑘 𝛾𝑗,𝑘 ′

and 𝐺

𝑘,𝑗 ′ = enc𝑗 𝛾𝑗,𝑘 ′

Send Γ𝑗, 𝐸

𝑘,𝑗, 𝐸 𝑘,𝑗 ′ , 𝐺 𝑘,𝑗 , 𝐺 𝑘,𝑗 ′

to 𝒬

𝑘.

  • 3. Set Δ𝑗 = ς𝑘 Γ

𝑘 𝑙𝑗 and send Δ𝑗, 𝜀𝑗 to all

  • 4. Set 𝑆 =

ς𝑘 Γ

𝑘 𝜀−1

and send 𝜏𝑗 = 𝑙𝑗 𝑛 + 𝑠𝜓𝑗 to all

Output (𝑠, 𝜏) if it’s a valid sig

slide-35
SLIDE 35

Accountability

slide-36
SLIDE 36

Accountability

Fault Attribution Process(es)  If zk-proof fails, attribute fault to relevant party.  Parties verify only parts of the transcript.  Offline GMW-Style accountability is wasteful.

𝑃(𝑜2) comp/comm

  • verhead for “GMW-

style accountability”

slide-37
SLIDE 37

If nonce 𝑆 is malformed: a) Open* all the ciphertexts {𝐸𝑗,𝑘

′ }𝑘≠𝑗.

b) Verify which party sent the wrong 𝜀

𝑘.

Accountability

Fault Attribution Process(es)

slide-38
SLIDE 38

If signature-string does not verify  Not possible to reveal the underlying plaintexts.  Our Solution for Protocol 2 a) Reveal 𝑇

𝑘 = 𝑆𝑙𝑘 and 𝑍 𝑘 = 𝑆𝜓𝑘 during presigning.

Check that they are well-formed**.

b) Once 𝑛 is known check 𝑆𝜏𝑗 = 𝑇𝑗

𝑛 ⋅ 𝑍 𝑗 𝑠.

Accountability

Fault Attribution Process(es)

Includes long- term secrets 𝑦1 … 𝑦𝑜 Incurs a round- complexity penalty.

𝑃(𝑜) comp/comm overhead!

slide-39
SLIDE 39

Security Analysis

slide-40
SLIDE 40

Security Analysis

Previous works show security either via

  • 1. Secure FE of ECDSA (in standalone or UC-framework)
  • 2. Standalone reduction to unforgeability of ECDSA

THIS WORK (New) Our protocol(s) UC-realize an ideal threshold signature functionality.

1. Authorized sets can generate valid signatures. 2. Unauthorized sets cannot generate valid signatures.

Crux of the proof: UC simulation is indistinguishable unless non-threshold ECDSA is forgeable.

Scheme is provably secure against adaptive adversary

Analysis in ROM

slide-41
SLIDE 41

Conclusion

  • We leverage Paillier Encryption as a commitment scheme

Reduces round-complexity and enables concurrent signings.

  • We devise a special-purpose technique for fault attribution.

Reduces complexity penalty for accountability.

  • Completely new approach for obtaining UC-security.

Security against adaptive adv. to gain full proactive security.