Improved Threshold Signature Scheme CSI-FiSh with Fast Secret Recovery
https://doi.org/10.55648/1998-6920-2023-17-1-76-91
Abstract
The paper presents an improved version of the CSI-FiSh threshold signature offered by L. De Feo and M. Meyer in 2020. In the proposed scheme, public and private keys are additionally updated avoiding the case of compromising a dealer. It is also proposed to eliminate the sequential information transfer between participants when signing and replace it with an assembly with the participation of the dealer. Experimental results showing the effectiveness of the proposed approach and the assessment of the resulting scheme safety are presented.
Keywords
About the Authors
V. V. DavydovRussian Federation
Vadim V. Davydov, 4th year PhD student of the Department of Information Security, lecturer
Kronverksky Pr. 49, bldg. A, St. Petersburg, 197101
A. F. Khutsaeva
Russian Federation
Altana F. Khutsaeva, Engineer, 2nd year master’s degree student of the Department of Information Security
Kronverksky Pr. 49, bldg. A, St. Petersburg, 197101
I. D. Ioganson
Russian Federation
Ivan D. Ioganson, Engineer, PhD student of the Department of Information Security
Kronverksky Pr. 49, bldg. A, St. Petersburg, 197101
Z.-M. N. Dakuo
Russian Federation
Zhan-Mishel N. Dakuo, Engineer, PhD student of the Department of Information Security
Kronverksky Pr. 49, bldg. A, St. Petersburg, 197101
S. V. Bezzateev
Russian Federation
Sergey V. Bezzateev, Head of Information Security Department; Director of Cryptographic Methods of Information Security Laboratory
190000, Saint-Petersburg, Bolshaya Morskaya str. 67, lit. A
Kronverksky Pr. 49, bldg. A, St. Petersburg, 197101
References
1. Goldfeder S. et al. Securing bitcoin wallets via threshold signatures. 2014.
2. Stathakopoulou C., Cachin C. Threshold signatures for blockchain systems. Swiss Federal Institute of Technology, 2017, vol. 30, pp. 1.
3. Johnson D., Menezes A., Vanstone S. The elliptic curve digital signature algorithm (ECDSA). International journal of information security, 2001, vol. 1, no. 1, pp. 36-63.
4. Zhang F., Safavi-Naini R., Susilo W. An efficient signature scheme from bilinear pairings and its applications. International workshop on public key cryptography, Springer, Berlin, Heidelberg, 2004, pp. 277- 290.
5. Shor P. W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review, 1999, vol. 41, no. 2, pp. 303-332.
6. Rostovcev A. G., Mahovenko E. B. Kriptosistema na kategorii izogennyh ellipticheskih krivyh [Cryptosystem on the category of isogenic elliptic curves] Problemy informacionnoj bezopasnosti. Komp'yuternye sistemy, Saint-Petersburg, 2002, no. 3, p. 74.
7. Jao D. et al. SIKE: Supersingular isogeny key encapsulation. HAL, 2017, vol. 2017.
8. Computer Security Division I. T. L. Post-Quantum Cryptography | CSRC | CSRC. CSRC | NIST, [Research and analysis of computer network monitoring tools and methods], available at: https://csrc.nist.gov/projects/post-quantum-cryptography (accessed: 04.12.2022).
9. Castryck W., Decru T. An efficient key recovery attack on SIDH (preliminary version). Cryptology ePrint Archive, 2022.
10. Is SIKE broken yet? Is SIKE broken yet? [Research and analysis of computer network monitoring tools and methods], available at: https://issikebrokenyet.github.io/ (accessed: 04.12.2022).
11. De Feo L., Galbraith S. D. SeaSign: compact isogeny signatures from class group actions. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Cham, 2019, pp. 759-789.
12. Beullens W., Kleinjung T., Vercauteren F. CSI-FiSh: efficient isogeny based signatures through class group computations. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Cham, 2019, pp. 227-247.
13. De Feo L. et al. SQISign: compact post-quantum signatures from quaternions and isogenies. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Cham, 2020, pp. 64-93
14. Castryck W. et al. CSIDH: an efficient post-quantum commutative group action. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Cham, 2018, pp. 395-427.
15. De Feo L., Meyer M. Threshold schemes from isogeny assumptions. IACR International Conference on Public-Key Cryptography, Springer, Cham, 2020, pp. 187-212.
16. Cozzo D., Smart N. P. Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol. International Conference on Post-Quantum Cryptography, Springer, Cham, 2020, pp. 169-186.
17. Vélu J. Isogénies entre courbes elliptiques. CR Acad. Sci. Paris, Séries A, 1971, vol. 273, pp. 305-347.
18. Silvermann J. H. The arithmetic of elliptic curves. Graduate Texts in Mathematics, 1986, vol. 106.
19. Alamati N. et al. Cryptographic group actions and applications. International Conference on the Theory and Application of Cryptology and Information Security, Springer, Cham, 2020, pp. 411-439.
20. Sotakova J. Elliptic curves, isogenies, and endomorphism rings. p. 17.
21. Stolbunov A. Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves. Advances in Mathematics of Communications, 2010, vol. 4, no. 2, p. 215.
22. Couveignes J. M. Hard homogeneous spaces. Cryptology ePrint Archive, 2006.
23. Shamir A. How to share a secret. Communications of the ACM, 1979, vol. 22, no. 11, pp. 612-613.
24. Paillier P. Public-key cryptosystems based on composite degree residuosity classes. International conference on the theory and applications of cryptographic techniques, Springer, Berlin, Heidelberg, 1999, pp. 223-238.
25. Paverd A., Martin A., Brown I. Modelling and automatically analysing privacy properties for honest-butcurious adversaries. Tech. Rep., 2014.
Review
For citations:
Davydov V.V., Khutsaeva A.F., Ioganson I.D., Dakuo Z.N., Bezzateev S.V. Improved Threshold Signature Scheme CSI-FiSh with Fast Secret Recovery. The Herald of the Siberian State University of Telecommunications and Information Science. 2023;17(1):76-91. (In Russ.) https://doi.org/10.55648/1998-6920-2023-17-1-76-91