2019
DOI: 10.1007/978-3-030-35199-1_17
|View full text |Cite
|
Sign up to set email alerts
|

Distributing Any Elliptic Curve Based Protocol

Abstract: We show how to perform a full-threshold n-party actively secure MPC protocol over a subgroup of order p of an elliptic curve group E(K). This is done by utilizing a full-threshold n-party actively secure MPC protocol over Fp in the pre-processing model (such as SPDZ), and then locally mapping the Beaver triples from this protocol into equivalent triples for the elliptic curve. This allows us to transform essentially any (algebraic) one-party protocol over an elliptic curve, into an n-party one.As an example we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Other related works. The multiplication in the exponent approach we adopt bears similarity with [50], [47]. However, there are crucial differences.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Other related works. The multiplication in the exponent approach we adopt bears similarity with [50], [47]. However, there are crucial differences.…”
Section: Related Workmentioning
confidence: 99%
“…However, there are crucial differences. Both [50] and [47] consider security-with-abort, albeit differently. For example, [47] does not verify shares from parties while computing the KZG evaluation proof and uses properties of the KZG polynomial commitment to check the correctness of the final proof.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, as related work in the area of threshold cryptography, we note that several papers on threshold signatures [13,14], threshold Σ-proofs [15], and verifiable (or auditable) MPC [16,17] implicitly implement some form of secure groups for F * q or elliptic curves, but these papers do not treat secure groups in general terms.…”
Section: Introductionmentioning
confidence: 99%