Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3372297.3423364acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.

Published: 02 November 2020 Publication History

Abstract

In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which is also the first distributed key generation algorithm that can generate cryptographic keys with a dual (f,2f+1)-threshold (where f is the number of faulty parties). As a result, using our ADKG we remove the trusted setup assumption that the most scalable consensus algorithms make. In order to create a DKG with a dual (f,2f+1)- threshold we first answer in the affirmative the open question posed by Cachin et al. [7] on how to create an Asynchronous Verifiable Secret Sharing (AVSS) protocol with a reconstruction threshold of f+1<k łe 2f+1, which is of independent interest. Our High-threshold-AVSS (HAVSS) uses an asymmetric bivariate polynomial to encode the secret. This enables the reconstruction of the secret only if a set of k nodes contribute while allowing an honest node that did not participate in the sharing phase to recover his share with the help of f+1 honest parties. Once we have HAVSS we can use it to bootstrap scalable partially synchronous consensus protocols, but the question on how to get a DKG in asynchrony remains as we need a way to produce common randomness. The solution comes from a novelEventually Perfect Common Coin (EPCC) abstraction that enables the generation of a common coin from n concurrent HAVSS invocations. EPCC's key property is that it is eventually reliable, as it might fail to agree at most f times (even if invoked a polynomial number of times). UsingEPCC we implement anEventually Efficient Asynchronous Binary Agreement (EEABA) which is optimal when the EPCC agrees and protects safety when EPCC fails. Finally, using EEABA we construct the first ADKG which has the same overhead and expected runtime as the best partially-synchronous DKG (O(n4) words, O(f) rounds). As a corollary of our ADKG, we can also create the first Validated Asynchronous Byzantine Agreement (VABA) that does not need a trusted dealer to setup threshold signatures of degree n-f. Our VABA has an overhead of expected O(n2) words and O(1) time per instance, after an initial O(n4) words and O(f) time bootstrap via ADKG.

Supplementary Material

MOV File (Copy of CCS20_fpe484_Asynchronous - Brian Hollendyke.mov)
Presentation video

References

[1]
Ittai Abraham, Dahlia Malkhi, and Alexander Spiegelman. Asymptotically optimal validated asynchronous byzantine agreement. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, pages 337--346, 2019.
[2]
Abhinav Aggarwal, Mahnush Movahedi, Jared Saia, and Mahdi Zamani. Bootstrapping public blockchains without a trusted setup. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, pages 366--368, 2019.
[3]
Georgia Avarikioti, Eleftherios Kokoris Kogias, and Roger Wattenhofer. Brick: Asynchronous state channels. arXiv preprint arXiv:1905.11360, 2019.
[4]
Laasya Bangalore, Ashish Choudhury, and Arpita Patra. Almost-surely terminating asynchronous byzantine agreement revisited. In Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, pages 295--304. ACM, 2018.
[5]
Michael Ben-Or, Boaz Kelmer, and Tal Rabin. Asynchronous secure computations with optimal resilience. In Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing, pages 183--192. ACM, 1994.
[6]
Gabriel Bracha. An asynchronous [(n-1)/3]-resilient consensus protocol. In Proceedings of the third annual ACM symposium on Principles of distributed computing, pages 154--162. ACM, 1984.
[7]
Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, and Reto Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. In Proceedings of the 9th ACM conference on Computer and communications security, pages 88--97. ACM, 2002.
[8]
Christian Cachin, Klaus Kursawe, Frank Petzold, and Victor Shoup. Secure and efficient asynchronous broadcast protocols. In Annual International Cryptology Conference, pages 524--541. Springer, 2001.
[9]
Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in constantinople: Practical asynchronous byzantine agreement using cryptography. Journal of Cryptology, 18(3):219--246, 2005.
[10]
Christian Cachin and Stefano Tessaro. Asynchronous verifiable information dispersal. In 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05), pages 191--201. IEEE, 2005.
[11]
Ran Canetti and Tal Rabin. Fast asynchronous byzantine agreement with optimal resilience. In STOC, volume 93, pages 42--51. Citeseer, 1993.
[12]
Ashish Choudhury. Optimally-resilient unconditionally-secure asynchronous multi-party computation revisited. Cryptology ePrint Archive, Report 2020/906, 2020. https://eprint.iacr.org/2020/906.
[13]
Ashish Choudhury and Arpita Patra. An efficient framework for unconditionally secure multiparty computation. IEEE Transactions on Information Theory, 63(1):428--468, 2016.
[14]
Ran Cohen. Asynchronous secure multiparty computation in constant time. In Public-Key Cryptography--PKC 2016, pages 183--207. Springer, 2016.
[15]
Sandro Coretti, Juan Garay, Martin Hirt, and Vassilis Zikas. Constant-round asynchronous multi-party computation based on one-way functions. In International Conference on the Theory and Application of Cryptology and Information Security, pages 998--1021. Springer, 2016.
[16]
Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson. Impossibility of distributed consensus with one faulty process. JACM, 1985.
[17]
Bryan Ford, Philipp Jovanovic, and Ewa Syta. Que sera consensus: Simple asynchronous agreement with private coins and threshold logical clocks. arXiv preprint arXiv:2003.02291, 2020.
[18]
Juan A Garay, Aggelos Kiayias, Nikos Leonardos, and Giorgos Panagiotakos. Bootstrapping the blockchain, with applications to consensus and fast pki setup. In IACR International Workshop on Public Key Cryptography, pages 465--495. Springer, 2018.
[19]
Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, and Tal Rabin. Secure distributed key generation for discrete-log based cryptosystems. In International Conference on the Theory and Applications of Cryptographic Techniques, pages 295--310. Springer, 1999.
[20]
Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael Reiter, Dragos-Adrian Seredinschi, Orr Tamir, and Alin Tomescu. Sbft: a scalable and decentralized trust infrastructure. In 2019 49th Annual IEEE/IFIP international conference on dependable systems and networks (DSN), pages 568--580. IEEE, 2019.
[21]
Vassos Hadzilacos and Sam Toueg. A modular approach to fault-tolerant broadcasts and related problems. Technical report, Cornell University, 1994.
[22]
Martin Hirt, Jesper Buus Nielsen, and Bartosz Przydatek. Cryptographic asynchronous multi-party computation with optimal resilience. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 322--340. Springer, 2005.
[23]
Martin Hirt, Jesper Buus Nielsen, and Bartosz Przydatek. Asynchronous multi-party computation with quadratic communication. In International Colloquium on Automata, Languages, and Programming, pages 473--485. Springer, 2008.
[24]
Aniket Kate, Yizhou Huang, and Ian Goldberg. Distributed key generation in the wild. IACR Cryptology ePrint Archive, 2012:377, 2012.
[25]
Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th $$usenix$$ security symposium ($$usenix$$ security 16), pages 279--296, 2016.
[26]
Eleftherios Kokoris-Kogias, Enis Ceyhun Alp, Sandra Deepthy Siby, Nicolas Gailly, Linus Gasser, Philipp Jovanovic, Ewa Syta, and Bryan Ford. Calypso: Auditable sharing of private data over blockchains. IACR Cryptol. ePrint Arch., Tech. Rep, 209:2018, 2018.
[27]
Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, and Bryan Ford. Omniledger: A secure, scale-out, decentralized ledger via sharding. In 2018 IEEE Symposium on Security and Privacy (SP), pages 583--598. IEEE, 2018.
[28]
Beno^it Libert, Marc Joye, and Moti Yung. Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares. Theoretical Computer Science, 645:1--24, 2016.
[29]
Achour Mostéfaoui, Hamouma Moumen, and Michel Raynal. Signature-free asynchronous binary byzantine consensus with t< n/3, o (n2) messages, and o (1) expected time. Journal of the ACM (JACM), 62(4):31, 2015.
[30]
Arpita Patra, Ashish Choudhary, and C Pandu Rangan. Efficient statistical asynchronous verifiable secret sharing with optimal resilience. In International Conference on Information Theoretic Security, pages 74--92. Springer, 2009.
[31]
Marshall Pease, Robert Shostak, and Leslie Lamport. Reaching agreement in the presence of faults. Journal of the ACM (JACM), 27(2):228--234, 1980.
[32]
Torben Pryds Pedersen. A threshold cryptosystem without a trusted party. In Workshop on the Theory and Application of of Cryptographic Techniques, pages 522--526. Springer, 1991.
[33]
Fred B Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys (CSUR), 22(4):299--319, 1990.
[34]
Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J Fischer, and Bryan Ford. Scalable bias-resistant distributed randomness. In 2017 IEEE Symposium on Security and Privacy (SP), pages 444--460. Ieee, 2017.
[35]
Maofan Yin, Dahlia Malkhi, Michael K Reiter, Guy Golan Gueta, and Ittai Abraham. Hotstuff: Bft consensus with linearity and responsiveness. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, pages 347--356, 2019.

Cited By

View all
  • (2025)Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with ApplicationsIACR Communications in Cryptology10.62056/a0qj5w7sf1:4Online publication date: 13-Jan-2025
  • (2024)Synchronous Distributed Key Generation without BroadcastsIACR Communications in Cryptology10.62056/ayfhsgvtwOnline publication date: 8-Jul-2024
  • (2024)Cryptographic SolutionsSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch007(145-168)Online publication date: 30-Jun-2024
  • Show More Cited By

Index Terms

  1. Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
          October 2020
          2180 pages
          ISBN:9781450370899
          DOI:10.1145/3372297
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 02 November 2020

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. asynchornous verifiable secret sharing
          2. binary agreement
          3. blockchain
          4. byzantine fault-tolerance
          5. consensus
          6. distributed key generation
          7. multiparty computation
          8. randomness
          9. threshold sharing

          Qualifiers

          • Research-article

          Conference

          CCS '20
          Sponsor:

          Acceptance Rates

          Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

          Upcoming Conference

          CCS '25

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)141
          • Downloads (Last 6 weeks)14
          Reflects downloads up to 06 Feb 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2025)Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with ApplicationsIACR Communications in Cryptology10.62056/a0qj5w7sf1:4Online publication date: 13-Jan-2025
          • (2024)Synchronous Distributed Key Generation without BroadcastsIACR Communications in Cryptology10.62056/ayfhsgvtwOnline publication date: 8-Jul-2024
          • (2024)Cryptographic SolutionsSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch007(145-168)Online publication date: 30-Jun-2024
          • (2024)Asynchronous Consensus without Trusted Setup or Public-Key CryptographyProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670327(3242-3256)Online publication date: 2-Dec-2024
          • (2024)Wahoo: A DAG-Based BFT Consensus With Low Latency and Low Communication OverheadIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.340908219(7508-7522)Online publication date: 2024
          • (2024)Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common SubsetIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338260219(4534-4546)Online publication date: 2024
          • (2024)Generic Construction of Threshold Credential Management With User-Autonomy AggregationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334789719(2549-2564)Online publication date: 1-Jan-2024
          • (2024)BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT ReplicationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.331894319(44-58)Online publication date: 1-Jan-2024
          • (2024)hinTS: Threshold Signatures with Silent Setup2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00057(3034-3052)Online publication date: 19-May-2024
          • (2024)Juno: Aggregated Vector Consensus for Optimal Asynchronous Common Subset2024 IEEE 29th Pacific Rim International Symposium on Dependable Computing (PRDC)10.1109/PRDC63035.2024.00023(98-108)Online publication date: 13-Nov-2024
          • Show More Cited By

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media