Chapter 7iv: Threshold Signature Schemes Flashcards

1
Q
  • Identified challenges with classical public key cryptography
  • What if the Ksec key gets compromised?
  • What if the node that stores Ksec is not available or gets destroyed?
  • What if we need more than one entity to sign, think “distributed system”?
A

  • Threshold signature schemes solve above challenges
  • Attacker needs to compromise t nodes to compromise the Ksec
  • If at least t nodes remain functional, a signature can be computed – availability
  • Each node can decide if it wants to participate in the signing process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

* Variety of interesting use-cases: Threshold Digital Signatures

A
  • Cryptographic wallets – both custodial and private wallets
  • Public key infrastructure (PKI), e.g. to protect the private key of a certificate authority (CA)
  • Byzantine Fault Tolerant (BFT) protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threshold Signature Schemes Mode of Operation

Three main steps. Explain

A

Key generation, Signing, Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TSS

Key Generation – Trusted Setup – Shamir’s Secret Sharing [4]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Initialization:
Secret Sharing:
Signing:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Start of Signing: …
Signing: …
Interpolation: …

A
  • Client sends a message m to all nodes
  • Nodes participate in signature protocol, obtained partial signatures are sent to aggregator/client
  • The aggregator/client combines individual partial signatures once it receives t to obtain full signa- ture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly