Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

邮发代号 80-970

2019 Impact Factor: 1.275

Frontiers of Computer Science  2024, Vol. 18 Issue (1): 181802   https://doi.org/10.1007/s11704-022-2288-x
  本期目录
Non-interactive SM2 threshold signature scheme with identifiable abort
Huiqiang LIANG, Jianhua CHEN()
School of Mathematics and Statistics, Wuhan University, Wuhan 430072, China
 全文: PDF(9042 KB)   HTML
Abstract

A threshold signature is a special digital signature in which the N-signer share the private key x and can construct a valid signature for any subset of the included t-signer, but less than t-signer cannot obtain any information. Considering the breakthrough achievements of threshold ECDSA signature and threshold Schnorr signature, the existing threshold SM2 signature is still limited to two parties or based on the honest majority setting, there is no more effective solution for the multiparty case. To make the SM2 signature have more flexible application scenarios, promote the application of the SM2 signature scheme in the blockchain system and secure cryptocurrency wallets. This paper designs a non-interactive threshold SM2 signature scheme based on partially homomorphic encryption and zero-knowledge proof. Only the last round requires the message input, so make our scheme non-interactive, and the pre-signing process takes 2 rounds of communication to complete after the key generation. We allow arbitrary threshold tn and design a key update strategy. It can achieve security with identifiable abort under the malicious majority, which means that if the signature process fails, we can find the failed party. Performance analysis shows that the computation and communication costs of the pre-signing process grows linearly with the parties, and it is only 1/3 of the Canetti’s threshold ECDSA (CCS'20).

Key wordsSM2 signature    secure multi-party computation    threshold signature    UC-secure    dishonest majority
收稿日期: 2022-05-25      出版日期: 2023-02-21
Corresponding Author(s): Jianhua CHEN   
作者简介:

Qingyong Zheng and Ya Gao contributed equally to this work.

 引用本文:   
. [J]. Frontiers of Computer Science, 2024, 18(1): 181802.
Huiqiang LIANG, Jianhua CHEN. Non-interactive SM2 threshold signature scheme with identifiable abort. Front. Comput. Sci., 2024, 18(1): 181802.
 链接本文:  
https://academic.hep.com.cn/fcs/CN/10.1007/s11704-022-2288-x
https://academic.hep.com.cn/fcs/CN/Y2024/V18/I1/181802
Sym. SM2 modified SM2
sk dA x
pk dAG (x?1?1)G
x1 (x1,y1)=kG (x1,y1)=kG
e Hv(ZA||M) Hv(ZA||M)
r e+x1modn e+x1modn
s (1+dA)?1(k?rdA)modn x(k+r)?rmodn
Tab.1  
Fig.1  
Fig.2  
Fig.3  
Fig.4  
Fig.5  
Fig.6  
Fig.7  
Fig.8  
Fig.9  
Fig.10  
Fig.11  
Step Round Computation Communication
Paillier-keygen 1 422N n(2k+334μ)
SM2Ts-keygen 6 8N+(14+t)G+4N2+n(17N+8G+14N2) 9k+7μ+n(18k+13μ)
Pre-signing 2 8N+4G+4N2+t(17N+4G+12N2) 9k+7μ+t(17k+12μ)
Signing 1 0 nk
MultiAdd 2 8N+3G+4N2+n(16N+3G+12N2) 9k+7μ+n(17k+12μ)
VSS 1 tG+n(N+5G+2N2) (t+2)k+nμ
Tab.2  
Step Round Computation Communication
Keygen 5 n(11G+11N2) n(11k+11μ)
Keygen(ours) 7 14G+434N2+n(9G+31N2) 9k+7μ+n(19k+346μ)
Signing 8 n(78G+21N2) n(59k+24μ)
Signing(ours) 3 4G+12N2+n(4G+29N2) 9k+7μ+n(18k+12μ)
Tab.3  
Pre-signing Round Computation Communication
Three rounds 3 n(56N+12G+33N2) n(57k+54μ)
Six rounds 6 n(49N+29G+33N2) n(67k+51μ)
Lightweight 7 n(38N+26G+19N2) n(67k+30μ)
Ours 2 8N+4G+4N2+t(17N+4G+12N2) 9k+7μ+t(17k+12μ)
Tab.4  
(n or t)/s Paillier-keygen SM2Ts-keygen Pre-signing
2 15.85 17.3 16.35
3 21.27 46.28 43.27
4 29.38 86.89 83.68
5 35.79 141.82 134.93
6 44.9 209.24 203.48
7 52.27 288.51 283.35
8 65 386.76 378.03
9 71.72 490.02 484.11
Tab.5  
  
  
ZKproof Computation (prover) Computation (verifier) Communication
prm 80N 80N 160μ
mod 160N 80N 160μ
fac 10N 11N 2k+11μ
log* 1G+5N+1N2 2G+3N+2N2 7k+6μ
enc 5N+1N2 3N+2N2 6k+6μ
enc* 1G+10N+3N2 2G+6N+5N2 17k+12μ
log 1G 2G 2k
mul 2N2 3N+4N2 k+2μ
  
1 Y Desmedt . Society and group oriented cryptography: a new concept. In: Proceedings of the Advances in Cryptology. 1988, 120−127
2 Y, Desmedt Y Frankel . Threshold cryptosystems. In: Proceedings of the Advances in Cryptology. 1990, 307−315
3 ISO. ISO/IEC 14888-3:2018 IT security techniques-Digital signatures with appendix-part 3: discrete logarithm based mechanisms. Geneva, Switzerland: International Organization for Standardization, 2018
4 J, Nick T, Ruffing Y Seurin . MuSig2: simple two-round schnorr multi-signatures. In: Proceedings of the 41st Annual International Cryptology Conference on Advances in Cryptology. 2021, 189–221
5 P, MacKenzie M K Reiter . Two-party generation of DSA signatures. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology. 2001, 137−154
6 R, Gennaro S, Goldfeder A Narayanan . Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security. In: Proceedings of the 14th International Conference on Applied Cryptography and Network Security. 2016, 156−174
7 Y Lindell . Fast secure two-party ECDSA signing. Journal of Cryptology, 2021, 34( 4): 44
8 J, Doerner Y, Kondi E, Lee A Shelat . Secure two-party threshold ECDSA from ECDSA assumptions. In: Proceedings of 2018 IEEE Symposium on Security and Privacy (SP). 2018, 980–997
9 R, Gennaro S Goldfeder . Fast multiparty threshold ECDSA with fast trustless setup. In: Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018, 1179−1194
10 M Pettit . Efficient threshold-optimal ECDSA. In: Proceedings of the 20th International Conference on Cryptology and Network Security. 2021, 116−135
11 R, Canetti R, Gennaro S, Goldfeder N, Makriyannis U Peled . UC non-interactive, proactive, threshold ECDSA with identifiable aborts. In: Proceedings of 2020 ACM SIGSAC Conference on Computer and Communications Security. 2020, 1769−1787
12 Y, Lindell A Nof . Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody. In: Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018, 1837−1854
13 M, Shang Y, Ma J Q, Lin J W Jing . A threshold scheme for SM2 elliptic curve cryptographic algorithm. Journal of Cryptologic Research, 2014, 1( 2): 155–166
14 Y, Zhang D, He M, Zhang K K R Choo . A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm. Frontiers of Computer Science, 2020, 14( 3): 143803
15 M Keller . MP-SPDZ: a versatile framework for multi-party computation. In: Proceedings of 2020 ACM SIGSAC Conference on Computer and Communications Security. 2020, 1575−1590
16 A, Acar H, Aksu A S, Uluagac M Conti . A survey on homomorphic encryption schemes: theory and implementation. ACM Computing Surveys, 2019, 51( 4): 79
17 Administration S C. Information security technology—Public key cryptographic algorithm SM2 based on elliptic curves—Part 2: Digital signature algorithm. Beijing: State Cryptography Administration, 2016
18 P Paillier . Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the International Conference on Advances in Cryptology. 1999, 223−238
19 Tymokhanov D, Shlomovits O. Alpha-rays: key extraction attacks on threshold ECDSA implementations. IACR Cryptology ePrint Archive, 2021, 2021:1621
20 Gennaro R, Goldfeder S. One round threshold ECDSA with identifiable abort. IACR Cryptology ePrint Archive, 2020, 2020:540
21 A Shamir . How to share a secret. Communications of the ACM, 1979, 22( 11): 612–613
22 P Feldman . A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of the 28th Annual Symposium on Foundations of Computer Science. 1987, 427−438
23 Lindell Y. Simple three-round multiparty schnorr signing with full simulatability. IACR Cryptology ePrint Archive, 2022, 2022:374
24 R, Cramer I, Damgård B Schoenmakers . Proofs of partial knowledge and simplified design of witness hiding protocols. In: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology. 1994, 174−187
25 R, Cohen I, Haitner E, Omri L Rotem . From fairness to full security in multiparty computation. Journal of Cryptology, 2022, 35( 1): 4
26 O Goldreich . Foundations of Cryptography: Volume 2, Basic Applications. Cambridge: Cambridge University Press, 2009
27 R Canetti . Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science. 2001, 136−145
28 Li X, He M. A protocol of member-join in a secret sharing scheme. In: Proceedings of the 2nd Information Security Practice and Experience. 2006, 134−141
29 J, Yu F, Kong R, Hao X Li . How to publicly verifiably expand a member without changing old shares in a secret sharing scheme. In: Proceedings of the IEEE ISI 2008 International Workshops on Intelligence and Security Informatics. 2008, 138−148
30 G, Castagnos D, Catalano F, Laguillaumie F, Savasta I Tucker . Two-party ECDSA from hash proof systems and efficient instantiations. In: Proceedings of the 39th Annual International Cryptology Conference on Advances in Cryptology. 2019, 191–221
31 J, Doerner Y, Kondi E, Lee A Shelat . Threshold ECDSA from ECDSA assumptions: the multiparty case. In: Proceedings of 2019 IEEE Symposium on Security and Privacy (SP). 2019, 1051−1066
32 C, Wang D, Wang Y, Tu G, Xu H Wang . Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 2022, 19( 1): 507–523
33 S, Qiu D, Wang G, Xu S Kumari . Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Transactions on Dependable and Secure Computing, 2022, 19( 2): 1338–1351
34 Q, Wang D, Wang C, Cheng D He . Quantum2FA: efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Transactions on Dependable and Secure Computing, 2021, doi:
35 Z, Li D, Wang E Morais . Quantum-safe round-optimal password authentication for mobile devices. IEEE Transactions on Dependable and Secure Computing, 2022, 19( 3): 1885–1899
[1] FCS-22288-OF-HL_suppl_1 Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed