Chapter 7iv: Threshold Signature Schemes Flashcards
1
Q
- Identified challenges with classical public key cryptography
- What if the Ksec key gets compromised?
- What if the node that stores Ksec is not available or gets destroyed?
- What if we need more than one entity to sign, think “distributed system”?
A
- Threshold signature schemes solve above challenges
- Attacker needs to compromise t nodes to compromise the Ksec
- If at least t nodes remain functional, a signature can be computed – availability
- Each node can decide if it wants to participate in the signing process
2
Q
* Variety of interesting use-cases: Threshold Digital Signatures
A
- Cryptographic wallets – both custodial and private wallets
- Public key infrastructure (PKI), e.g. to protect the private key of a certificate authority (CA)
- Byzantine Fault Tolerant (BFT) protocols
3
Q
Threshold Signature Schemes Mode of Operation
Three main steps. Explain
A
Key generation, Signing, Verification
4
Q
TSS
Key Generation – Trusted Setup – Shamir’s Secret Sharing [4]
A
5
Q
A
6
Q
Initialization:
Secret Sharing:
Signing:
A
7
Q
Start of Signing: …
Signing: …
Interpolation: …
A
- Client sends a message m to all nodes
- Nodes participate in signature protocol, obtained partial signatures are sent to aggregator/client
- The aggregator/client combines individual partial signatures once it receives t to obtain full signa- ture