Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
DOI: 10.1145/3548606.3559397
|View full text |Cite
|
Sign up to set email alerts
|

Threshold Cryptography as a Service (in the Multiserver and YOSO Models)

Abstract: We consider large deployments of threshold cryptographic services that can run in traditional multi-server settings and, at a much larger scale, in blockchain environments. We present a set of techniques that improve performance and meet the requirements of settings with large number of servers and high rate of threshold operations. More fundamentally, our techniques enable threshold cryptographic applications to run in more challenging decentralized permissionless systems, such as contemporary blockchains.In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Each shard initializes a threshold signature scheme among the shard participants, so each party 𝑃 𝑗 can get its individual secret key 𝑠𝑘 𝑗 and corresponding public keys. The setup can be executed through distributed key generation [1,7,16]. Notably, the group public key 𝑔𝑝𝑘 serves as the shard buffer address receiving cross-shard inputs, so each shard's 𝑔𝑝𝑘 is public to all participants across the network.…”
Section: System and Threat Modelmentioning
confidence: 99%
“…Each shard initializes a threshold signature scheme among the shard participants, so each party 𝑃 𝑗 can get its individual secret key 𝑠𝑘 𝑗 and corresponding public keys. The setup can be executed through distributed key generation [1,7,16]. Notably, the group public key 𝑔𝑝𝑘 serves as the shard buffer address receiving cross-shard inputs, so each shard's 𝑔𝑝𝑘 is public to all participants across the network.…”
Section: System and Threat Modelmentioning
confidence: 99%