0%

Hierarchical Threshold Signature Scheme — An Approach to Distinguish Singers in Threshold…

25 Mar 2022 5 dakika okuma
Haber Makalesinin Reklâm Bandı Görseli
Coinbase Giving
Coinbase Giving

Introduction

AMIS is a financial technology company creating bonds between traditional and decentralized worlds. We provide security and accessibility for blockchains as well as for cryptocurrencies. With us, our customers can manage blockchain technology with ease and confidence.

What is MPC?

Distributed computing in computer science focuses on achieving the common purpose by a system having separate components, which are connecting, interacting, and conveying messages to each other. Multi-Party Computation(abbrev. MPC) makes sure the desired tasks are executed securely in a distributed system to prevent malicious entities. Many malicious entities steal the inputs of all components in the system or induce to deviate the correct results for their own purposes. Therefore, any secure protocols of MPC require the following two properties:

  • Privacy: Each party should not learn anything more than its prescribed output.

  • Correctness: Each party is guaranteed the correct output.

Why do we need to merge crypto private keys with MPC?

In the world of blockchain, the possession of private keys is the control of your assets. How do you protect your private key? A natural answer is that you entrust professional custodial service to manage private keys. However, it is easy to become the target of hackers. On the other hand, if users hold private keys, it is very likely to be stolen by adversaries due to weak awareness of information security, or some inappropriate operations.

Inspired by the practice of maintaining treasure maps, a naive idea is to divide the map into many parts and hide them in the distributed places. In this setting, the cost of attacks will increase owing to multiple spots. The next upcoming question is how to safely take these parts out for use. Since we are now in a distributed system, MPC becomes a natural option to solve the issue. This is because each component can safely and correctly execute the computational requirements guaranteed by MPC.

Threshold signature scheme (abbrev. TSS), a special application of MPC technology, dramatically decreases the risk of private key management. Most importantly, TSS does not save the private key, which is *split* into many parts called “ share”, on the server and provides risk control as well as separation of duties. Meanwhile, compared to multi-signature, TSS provides the native multi-signature capability for those blockchains that lack shorter signatures and better privacy. These significant advantages make TSS suitable for implementing hot wallets without revealing private keys and providing the service in real-time.

Who is Alice?

Compared to TSS, shares in this Hierarchical Threshold Signature Scheme(abbrev. HTSS) are allowed to have different ranks. The main merit of this scheme is vertical access control such that it has “partial accountability”. Although TSS achieves joint control to disperse risk among the participants and avoid single points of failure, the importance of all shares is equal. It is impossible to distinguish which share gets involved in an unexpected signature which is because TSS only supports horizontal access control. For example, an important contract not only requires enough signatures but also needs to be signed by a manager. In the HTSS framework, assigning different ranks of each share induces that any valid signature generated includes the share of the manager. We call this library Alice. The aim of Alice is to provide an open and audited TSS Library. At the same time, we will also organize some useful cryptography libraries independently in the developing process. In addition, AMIS will continuously keep updating this library and fixing potential security issues.

By means of sharing articles in the medium and opening research papers and libraries continuously, AMIS is motivated to a progressively higher capability. More precisely, we have:

Except for academic research, AMIS also developed the following products:

Roadmap and progress

In March, we will implement a new protocol of ECDSA: UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts including Key Generation, Key-Refresh & AuxiliaryInformation, Three-Round Sign, and Six-Round Sign. The part that hasn’t been integrated yet is the echo protocol which provides a secure broadcast environment for each node but adds one extra round of communication.

For EdDSA, we also adopt the well-known protocol: FROST, which supports the elliptic curves: ed25519 and sr25519. However, this part has not been integrated into the master branch of Alice. Of course, the above libraries also support Hierarchical secret sharing. We hope to complete all the above-mentioned tasks in May and prepare to audit in June. Finally, I am very grateful for the support of Coinbase’s grant, so that we can continue to accomplish this project.

Coinbase is officially seeking applications for our 2022 developer grants focused on blockchain developers who contribute directly to a blockchain codebase, or researchers producing white papers. Learn more about the call for applications here.

was originally published in The Coinbase Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.

Popüler haberler

How to Set Up and Use Trust Wallet for Binance Smart Chain
#Bitcoin#Bitcoins#Config+2 daha fazla etiket

How to Set Up and Use Trust Wallet for Binance Smart Chain

Your Essential Guide To Binance Leveraged Tokens

Your Essential Guide To Binance Leveraged Tokens

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)
#Subscriptions

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)

What is Grid Trading? (A Crypto-Futures Guide)

What is Grid Trading? (A Crypto-Futures Guide)

Cryptohopper sayesinde ücretsiz bir şekilde alım satım yapmaya başlayın!

Kullanımı ücretsiz - kredi kartı gerekmez

Haydi başlayalım
Cryptohopper appCryptohopper app

Feragatnâme: Cryptohopper belli kural veya yasalara göre idare edilen bir kuruluş değildir. Kripto paraların bot üzerinden alım satımı önemli riskler içerir, ayrıca bir kripto paranın geçmiş performansı gelecekteki sonuçlarının göstergesi değildir. Ürün ekran görüntülerinde gösterilen kârlar tamamen açıklama amaçlıdır ve abartılı olabilir. Yalnızca yeterli bilgiye sahipseniz veya nitelikli bir finansal danışmandan rehberlik alıyorsanız Bot yoluyla alım satıma girişmelisiniz. Cryptohopper hiçbir koşul altında, (a) tamamen veya kısmen, yazılımımızın dahil olduğu işlemlerden kaynaklanan veya bunlarla bağlantılı olarak ortaya çıkan herhangi bir kayıp ya da hasar, veya (b) doğrudan, dolaylı, özel, sonuç olarak ortaya çıkan veya arızi zararlar için herhangi bir kişi veya kuruluşa karşı herhangi bir sorumluluğu kabul etmeyecektir. Cryptohopper sosyal alım satım platformunda bulunan içeriğin sadece Cryptohopper topluluğunun üyeleri tarafından oluşturulduğunu ve Cryptohopper firması tarafından yapılmış veya onun adına tavsiye veya öneri teşkil etmediğini lütfen unutmayın. Pazar yerinde gösterilen kârlar gelecekteki elde edilecek sonuçlara dair bir gösterge temsil etmez. Cryptohopper'ın hizmetlerini kullanarak, kripto para birimi alım satımının doğasında bulunan riskleri kabul etmiş ve ayrıca Cryptohopper'ı ortaya çıkacak her türlü yükümlülük veya zarardan muaf tutmayı da kabul etmiş oluyorsunuz. Yazılımımızı kullanmadan veya herhangi bir alım satım faaliyetinde bulunmadan önce, Hizmet Şartlarımızı ve Risk Bilgilendirme Politikamızı gözden geçirmek ve anlamak çok önemlidir. Özel koşullarınıza göre kişiselleştirilmiş tavsiyeler için lütfen konuyla ilgili deneyim ve uzmanlık sahibi hukuk ve finans uzmanlarına danışın.

©2017 - 2025 Telif hakkı Cryptohopper™'a aittir - Tüm hakları saklıdır.