0%

Hierarchical Threshold Signature Scheme — An Approach to Distinguish Singers in Threshold…

25 Mar 2022 5 menit baca
Gambar Spanduk Artikel Berita
Coinbase Giving
Coinbase Giving

Introduction

AMIS is a financial technology company creating bonds between traditional and decentralized worlds. We provide security and accessibility for blockchains as well as for cryptocurrencies. With us, our customers can manage blockchain technology with ease and confidence.

What is MPC?

Distributed computing in computer science focuses on achieving the common purpose by a system having separate components, which are connecting, interacting, and conveying messages to each other. Multi-Party Computation(abbrev. MPC) makes sure the desired tasks are executed securely in a distributed system to prevent malicious entities. Many malicious entities steal the inputs of all components in the system or induce to deviate the correct results for their own purposes. Therefore, any secure protocols of MPC require the following two properties:

  • Privacy: Each party should not learn anything more than its prescribed output.

  • Correctness: Each party is guaranteed the correct output.

Why do we need to merge crypto private keys with MPC?

In the world of blockchain, the possession of private keys is the control of your assets. How do you protect your private key? A natural answer is that you entrust professional custodial service to manage private keys. However, it is easy to become the target of hackers. On the other hand, if users hold private keys, it is very likely to be stolen by adversaries due to weak awareness of information security, or some inappropriate operations.

Inspired by the practice of maintaining treasure maps, a naive idea is to divide the map into many parts and hide them in the distributed places. In this setting, the cost of attacks will increase owing to multiple spots. The next upcoming question is how to safely take these parts out for use. Since we are now in a distributed system, MPC becomes a natural option to solve the issue. This is because each component can safely and correctly execute the computational requirements guaranteed by MPC.

Threshold signature scheme (abbrev. TSS), a special application of MPC technology, dramatically decreases the risk of private key management. Most importantly, TSS does not save the private key, which is *split* into many parts called “ share”, on the server and provides risk control as well as separation of duties. Meanwhile, compared to multi-signature, TSS provides the native multi-signature capability for those blockchains that lack shorter signatures and better privacy. These significant advantages make TSS suitable for implementing hot wallets without revealing private keys and providing the service in real-time.

Who is Alice?

Compared to TSS, shares in this Hierarchical Threshold Signature Scheme(abbrev. HTSS) are allowed to have different ranks. The main merit of this scheme is vertical access control such that it has “partial accountability”. Although TSS achieves joint control to disperse risk among the participants and avoid single points of failure, the importance of all shares is equal. It is impossible to distinguish which share gets involved in an unexpected signature which is because TSS only supports horizontal access control. For example, an important contract not only requires enough signatures but also needs to be signed by a manager. In the HTSS framework, assigning different ranks of each share induces that any valid signature generated includes the share of the manager. We call this library Alice. The aim of Alice is to provide an open and audited TSS Library. At the same time, we will also organize some useful cryptography libraries independently in the developing process. In addition, AMIS will continuously keep updating this library and fixing potential security issues.

By means of sharing articles in the medium and opening research papers and libraries continuously, AMIS is motivated to a progressively higher capability. More precisely, we have:

Except for academic research, AMIS also developed the following products:

Roadmap and progress

In March, we will implement a new protocol of ECDSA: UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts including Key Generation, Key-Refresh & AuxiliaryInformation, Three-Round Sign, and Six-Round Sign. The part that hasn’t been integrated yet is the echo protocol which provides a secure broadcast environment for each node but adds one extra round of communication.

For EdDSA, we also adopt the well-known protocol: FROST, which supports the elliptic curves: ed25519 and sr25519. However, this part has not been integrated into the master branch of Alice. Of course, the above libraries also support Hierarchical secret sharing. We hope to complete all the above-mentioned tasks in May and prepare to audit in June. Finally, I am very grateful for the support of Coinbase’s grant, so that we can continue to accomplish this project.

Coinbase is officially seeking applications for our 2022 developer grants focused on blockchain developers who contribute directly to a blockchain codebase, or researchers producing white papers. Learn more about the call for applications here.

was originally published in The Coinbase Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.

Berita populer

How to Set Up and Use Trust Wallet for Binance Smart Chain
#Bitcoin#Bitcoins#Config+2 lebih banyak tag

How to Set Up and Use Trust Wallet for Binance Smart Chain

Your Essential Guide To Binance Leveraged Tokens

Your Essential Guide To Binance Leveraged Tokens

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)
#Subscriptions

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)

What is Grid Trading? (A Crypto-Futures Guide)

What is Grid Trading? (A Crypto-Futures Guide)

Mulai trading dengan Cryptohopper secara gratis!

Gratis digunakan - tanpa perlu kartu kredit

Mari kita mulai
Cryptohopper appCryptohopper app

Disclaimer: Cryptohopper bukanlah entitas teregulasi. Bot trading mata uang kripto melibatkan risiko besar, dan kinerja masa lalu tidak merefleksikan hasil di masa depan. Keuntungan yang ditampilkan dalam tangkapan layar produk hanya untuk tujuan ilustrasi dan mungkin terkesan dibesar-besarkan. Bergabunglah trading bot hanya jika Anda memiliki pengetahuan yang cukup atau mencari panduan dari penasihat keuangan yang terkualifikasi. Dalam situasi apa pun Cryptohopper tidak akan bertanggung jawab kepada orang atau entitas mana pun atas (a) kerugian atau kerusakan, secara keseluruhan atau sebagian, yang disebabkan oleh, yang timbul dari, atau sehubungan dengan transaksi yang melibatkan perangkat lunak kami atau (b) kerugian langsung, tidak langsung, khusus, konsekuensial, atau insidental. Harap dicatat bahwa konten yang tersedia di platform trading sosial Cryptohopper dibuat oleh anggota komunitas Cryptohopper dan bukan merupakan saran atau rekomendasi dari Cryptohopper atau atas namanya. Keuntungan yang ditampilkan di Marketplace tidak merefleksikan hasil di masa depan. Dengan menggunakan layanan Cryptohopper, Anda mengakui dan menerima risiko yang terkait dalam trading mata uang kripto dan setuju untuk membebaskan Cryptohopper dari segala kewajiban atau kerugian yang terjadi. Peninjauan dan pemahaman atas Ketentuan Layanan dan Kebijakan Pengungkapan Risiko kami sangatlah penting sebelum Anda menggunakan perangkat lunak kami atau terlibat dalam aktivitas trading apa pun. Silakan berkonsultasi dengan profesional hukum dan keuangan untuk mendapatkan saran yang dipersonalisasi berdasarkan keadaan spesifik Anda.

©2017 - 2025 Hak cipta oleh Cryptohopper™ - Semua hak dilindungi undang-undang.