threshold schnorr with stateless deterministic signing
play

Threshold Schnorr with Stateless Deterministic Signing Franois - PowerPoint PPT Presentation

Threshold Schnorr with Stateless Deterministic Signing Franois Garillot, Yash vanth Kondi, Payman Mohassel, Valeria Nikolaenko Northeastern University Facebook Novi/Facebook Novi/Facebook Schnorr: Practical Issues SchnorrSign( , m )


  1. Threshold Schnorr with Stateless Deterministic Signing François Garillot, Yash vanth Kondi, Payman Mohassel, Valeria Nikolaenko Northeastern University Facebook Novi/Facebook Novi/Facebook

  2. Schnorr: Practical Issues SchnorrSign( 𝗍𝗅 , m ) : r ← β„€ q R = r β‹… G e = H ( R βˆ₯ m ) s = r βˆ’ 𝗍𝗅 β‹… e Οƒ = ( s , e ) output Οƒ

  3. Schnorr: Practical Issues SchnorrSign( 𝗍𝗅 , m ) : Fresh randomness needed to sign r ← β„€ q on every invocation R = r β‹… G e = H ( R βˆ₯ m ) s = r βˆ’ 𝗍𝗅 β‹… e Οƒ = ( s , e ) output Οƒ

  4. Schnorr: Practical Issues SchnorrSign( 𝗍𝗅 , m ) : Fresh randomness needed to sign r ← β„€ q on every invocation R = r β‹… G e = H ( R βˆ₯ m ) Even a tiny amount of bias can completely wreck security s = r βˆ’ 𝗍𝗅 β‹… e Οƒ = ( s , e ) output Οƒ

  5. Schnorr: Practical Issues SchnorrSign( 𝗍𝗅 , m ) : Fresh randomness needed to sign r ← β„€ q on every invocation R = r β‹… G e = H ( R βˆ₯ m ) Even a tiny amount of bias can completely wreck security s = r βˆ’ 𝗍𝗅 β‹… e Οƒ = ( s , e ) In practice: bad PRGs, software output Οƒ bugs, etc. Reliable entropy is scarce!

  6. Schnorr: Practical Issues SchnorrSign( 𝗍𝗅 , m ) : Fresh randomness needed to sign r ← β„€ q on every invocation R = r β‹… G e = H ( R βˆ₯ m ) Even a tiny amount of bias can completely wreck security s = r βˆ’ 𝗍𝗅 β‹… e Οƒ = ( s , e ) In practice: bad PRGs, software output Οƒ bugs, etc. Reliable entropy is scarce! Solution: de-randomize r

  7. Naive Derandomization β€’ Canonical solution is via a Pseudorandom Generator (PRG) - invoke for each new nonce β€’ However the state of the PRG must be updated reliablyβ€” security is very sensitive to this β€’ This creates a new practical hurdle, eg. state is usually backed up on secure storage where frequent reliable updates may not be possible β€’ We therefore require derandomization to be stateless

  8. Deterministic Signing DetSign( 𝗍𝗅 , k , m ) : r = 𝖦 k ( m ) R = r β‹… G e = H ( R βˆ₯ m ) s = r βˆ’ 𝗍𝗅 β‹… e Οƒ = ( s , e ) output Οƒ

  9. Deterministic Signing Sampled during key generation DetSign( 𝗍𝗅 , k , m ) : r = 𝖦 k ( m ) R = r β‹… G e = H ( R βˆ₯ m ) s = r βˆ’ 𝗍𝗅 β‹… e Οƒ = ( s , e ) output Οƒ

  10. Deterministic Signing Sampled during key generation DetSign( 𝗍𝗅 , k , m ) : F is a pseudorandom function r = 𝖦 k ( m ) eg. AES, or SHA as in EdDSA R = r β‹… G e = H ( R βˆ₯ m ) s = r βˆ’ 𝗍𝗅 β‹… e Οƒ = ( s , e ) output Οƒ

  11. The problem we asked was: How can we build a threshold signing protocol for Schnorr that is deterministic and stateless ?

  12. The problem we asked was: How can we build a threshold signing protocol for Schnorr that is deterministic and stateless ? i.e. after a one-time distributed key generation phase, parties interactively sign messages without sampling new randomness or updating their state

  13. The problem we asked was: How can we build a threshold signing protocol for Schnorr that is deterministic and stateless ? i.e. after a one-time distributed key generation phase, parties interactively sign messages without sampling new randomness or updating their state Implicit: deterministic nonce derivation

  14. Challenge β€’ β€œNaive” derandomization of threshold Schnorr: direct application of single party derandomization. Works for semi-honest adversaries β€’ Naive scheme completely broken by an adversary that deviates from the protocol (β€˜rewinding’ attack) β€’ Malicious setting: commit to k , prove correct nonce derivation (applying PRF( k ,m))

  15. Towards a solution Two very di ff erent settings: β€’ Honest majority : simple protocol with replicated secret sharing (small number of parties) β€’ Dishonest majority : 
 β€œthrow zero-knowledge proofs at it” [Goldreich-Micali- Wigderson 87]

  16. Dishonest Majority β€’ Non-linear signing equation: reminiscent of Threshold ECDSA β€’ Unlike ECDSA, this problem is trivial with semi- honest adversaries β€’ Before β€œfully malicious”, we ask: can we interpolate a meaningful intermediate between semi-honest and malicious?

  17. Covert Model β€’ Introduced by Aumann and Lindell (TCC ’07, JoC ’10) β€’ Sits between semi-honest and fully malicious security β€’ Quantified over arbitrarily cheating adversaries, but a cheating adversary can statistically evade detection with noticeable probability (eg. 10%) β€’ Reasonable in many scenarios (eg. business-to- business, among parties that know each other)

  18. Covert 2P Signing β€’ Protocol intuition: β€œwatchlist” technique. Alice derives nonce as a linear combination of n PRFs, Bob obliviously checks n -1 of them. β€’ Even for 90% deterrence, only marginally slower than semi-honest β€’ One extra curve point transmitted compared to SH, rounds unchanged (i.e. two) β€’ Likely usable in any setting where SH is feasible

  19. Malicious nP Signing β€’ We adapt Zero-knowledge from Garbled Circuits [ Jawurek-Kerschbaum-Orlandi 13 ] to prove these statements β€’ GCs are lightweight, e ffi cient for small Boolean circuits like AES β€’ Novel techniques for: - GC labels -> Elliptic curve point translation (almost for free) - Preprocessing Committed Oblivious Transfer (only PRF evaluations online)

  20. In Summary β€’ We study Schnorr with stateless deterministic threshold signing β€’ Alternatively, EdDSA where nonce derivation is by adding PRF outputs β€’ Landscape (relative to semi-honest, which is trivial): - Honest majority : β‰ˆ SH for few parties - Covert two-party : β‰ˆ SH for reasonable deterrence (90%) - All-but-one malicious : within order of magnitude of OT-based threshold ECDSA (100s of KB, estd. milliseconds/low tens of ms for 256-bit curve)

  21. Thanks! (paper coming soon)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend