Towards Scalable Threshold Cryptosystems

The resurging interest in Byzantine fault tolerant systems will demand more scalable threshold cryptosystems. Unfortunately, current systems scale poorly, requiring time quadratic in the number of participants. In this paper, we present techniques that help scale threshold signature schemes (TSS), v...

Full description

Bibliographic Details
Main Authors: Tomescu, Alin, Chen, Robert, Zheng, Yiming, Abraham, Ittai, Pinkas, Benny, Gueta, Guy Golan, Devadas, Srinivas
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE) 2021
Online Access:https://hdl.handle.net/1721.1/129845
_version_ 1826215913327689728
author Tomescu, Alin
Chen, Robert
Zheng, Yiming
Abraham, Ittai
Pinkas, Benny
Gueta, Guy Golan
Devadas, Srinivas
author2 Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
author_facet Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Tomescu, Alin
Chen, Robert
Zheng, Yiming
Abraham, Ittai
Pinkas, Benny
Gueta, Guy Golan
Devadas, Srinivas
author_sort Tomescu, Alin
collection MIT
description The resurging interest in Byzantine fault tolerant systems will demand more scalable threshold cryptosystems. Unfortunately, current systems scale poorly, requiring time quadratic in the number of participants. In this paper, we present techniques that help scale threshold signature schemes (TSS), verifiable secret sharing (VSS) and distributed key generation (DKG) protocols to hundreds of thousands of participants and beyond. First, we use efficient algorithms for evaluating polynomials at multiple points to speed up computing Lagrange coefficients when aggregating threshold signatures. As a result, we can aggregate a 130,000 out of 260,000 BLS threshold signature in just 6 seconds (down from 30 minutes). Second, we show how "authenticating"such multipoint evaluations can speed up proving polynomial evaluations, a key step in communication-efficient VSS and DKG protocols. As a result, we reduce the asymptotic (and concrete) computational complexity of VSS and DKG protocols from quadratic time to quasilinear time, at a small increase in communication complexity. For example, using our DKG protocol, we can securely generate a key for the BLS scheme above in 2.3 hours (down from 8 days). Our techniques improve performance for thresholds as small as 255 and generalize to any Lagrange-based threshold scheme, not just threshold signatures. Our work has certain limitations: we require a trusted setup, we focus on synchronous VSS and DKG protocols and we do not address the worst-case complaint overhead in DKGs. Nonetheless, we hope it will spark new interest in designing large-scale distributed systems.
first_indexed 2024-09-23T16:39:00Z
format Article
id mit-1721.1/129845
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T16:39:00Z
publishDate 2021
publisher Institute of Electrical and Electronics Engineers (IEEE)
record_format dspace
spelling mit-1721.1/1298452022-10-03T07:26:45Z Towards Scalable Threshold Cryptosystems Tomescu, Alin Chen, Robert Zheng, Yiming Abraham, Ittai Pinkas, Benny Gueta, Guy Golan Devadas, Srinivas Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory The resurging interest in Byzantine fault tolerant systems will demand more scalable threshold cryptosystems. Unfortunately, current systems scale poorly, requiring time quadratic in the number of participants. In this paper, we present techniques that help scale threshold signature schemes (TSS), verifiable secret sharing (VSS) and distributed key generation (DKG) protocols to hundreds of thousands of participants and beyond. First, we use efficient algorithms for evaluating polynomials at multiple points to speed up computing Lagrange coefficients when aggregating threshold signatures. As a result, we can aggregate a 130,000 out of 260,000 BLS threshold signature in just 6 seconds (down from 30 minutes). Second, we show how "authenticating"such multipoint evaluations can speed up proving polynomial evaluations, a key step in communication-efficient VSS and DKG protocols. As a result, we reduce the asymptotic (and concrete) computational complexity of VSS and DKG protocols from quadratic time to quasilinear time, at a small increase in communication complexity. For example, using our DKG protocol, we can securely generate a key for the BLS scheme above in 2.3 hours (down from 8 days). Our techniques improve performance for thresholds as small as 255 and generalize to any Lagrange-based threshold scheme, not just threshold signatures. Our work has certain limitations: we require a trusted setup, we focus on synchronous VSS and DKG protocols and we do not address the worst-case complaint overhead in DKGs. Nonetheless, we hope it will spark new interest in designing large-scale distributed systems. 2021-02-19T20:16:13Z 2021-02-19T20:16:13Z 2020-07 2020-05 2020-12-10T17:44:30Z Article http://purl.org/eprint/type/ConferencePaper 9781728134970 https://hdl.handle.net/1721.1/129845 Tomescu, Alin et al. "Towards Scalable Threshold Cryptosystems." 2020 IEEE Symposium on Security and Privacy, May 2020, San Francisco, California, Institute of Electrical and Electronics Engineers, July 2020. © 2020 IEEE en http://dx.doi.org/10.1109/sp40000.2020.00059 2020 IEEE Symposium on Security and Privacy Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Institute of Electrical and Electronics Engineers (IEEE) arXiv
spellingShingle Tomescu, Alin
Chen, Robert
Zheng, Yiming
Abraham, Ittai
Pinkas, Benny
Gueta, Guy Golan
Devadas, Srinivas
Towards Scalable Threshold Cryptosystems
title Towards Scalable Threshold Cryptosystems
title_full Towards Scalable Threshold Cryptosystems
title_fullStr Towards Scalable Threshold Cryptosystems
title_full_unstemmed Towards Scalable Threshold Cryptosystems
title_short Towards Scalable Threshold Cryptosystems
title_sort towards scalable threshold cryptosystems
url https://hdl.handle.net/1721.1/129845
work_keys_str_mv AT tomescualin towardsscalablethresholdcryptosystems
AT chenrobert towardsscalablethresholdcryptosystems
AT zhengyiming towardsscalablethresholdcryptosystems
AT abrahamittai towardsscalablethresholdcryptosystems
AT pinkasbenny towardsscalablethresholdcryptosystems
AT guetaguygolan towardsscalablethresholdcryptosystems
AT devadassrinivas towardsscalablethresholdcryptosystems