Threshold Cryptography as a Service (in the Multiserver and YOSO Models)

4Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We consider large deployments of threshold cryptographic services that can run in traditional multi-server settings and, at a much larger scale, in blockchain environments. We present a set of techniques that improve performance and meet the requirements of settings with large number of servers and high rate of threshold operations. More fundamentally, our techniques enable threshold cryptographic applications to run in more challenging decentralized permissionless systems, such as contemporary blockchains. In particular, we design and implement a novel threshold solution for the recently introduced YOSO (You Only Speak Once) model. The model builds on ever changing, unpredictable committees that perform ephemeral roles in a way that evades targeting by attackers and enables virtually unlimited scalability in very large networks. Our solution allows for the maintenance of system-wide keys that can be generated, used and proactivized as needed. The specific techniques build on optimized protocols for multi-secret multi-dealer verifiable secret sharing and their adaptation to the YOSO model. We demonstrate the practicality of our solutions by reporting on an end-to-end implementation of a proactive re-sharing protocol in the YOSO model, showing benchmarks for committees of sizes up to 500 nodes. For traditional multi-server settings, we obtain significant speedups in settings where dealers process many secrets simultaneously (say, to generate or proactivize many keys at the same time), e.g., we show 5X improvements relative to classical Pedersen VSS for 15 servers and 50 secrets, and 48X for 500 servers and 1000 secrets.

References Powered by Scopus

Non-interactive and information-theoretic secure verifiable secret sharing

1638Citations
N/AReaders
Get full text

A threshold cryptosystem without a trusted party

621Citations
N/AReaders
Get full text

Proactive secret sharing or: How to cope with perpetual leakage

510Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model

4Citations
N/AReaders
Get full text

On the Security of KZG Commitment for VSS

3Citations
N/AReaders
Get full text

Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Benhamouda, F., Halevi, S., Krawczyk, H., Miao, A., & Rabin, T. (2022). Threshold Cryptography as a Service (in the Multiserver and YOSO Models). In Proceedings of the ACM Conference on Computer and Communications Security (pp. 323–336). Association for Computing Machinery. https://doi.org/10.1145/3548606.3559397

Readers' Seniority

Tooltip

Professor / Associate Prof. 1

33%

PhD / Post grad / Masters / Doc 1

33%

Researcher 1

33%

Readers' Discipline

Tooltip

Computer Science 4

100%

Save time finding and organizing research with Mendeley

Sign up for free