hinTS: Threshold Signatures with Silent Setup

—We propose hinTS — a new threshold signature scheme built on top of the widely used BLS signatures. Our scheme enjoys the following attractive features:

[1]  L. Baird,et al.  Threshold Signatures in the Multiverse , 2023, 2023 IEEE Symposium on Security and Privacy (SP).

[2]  Zhuolun Xiang,et al.  Practical Asynchronous Distributed Key Generation , 2022, 2022 IEEE Symposium on Security and Privacy (SP).

[3]  Silvio Micali,et al.  Compact Certificates of Collective Knowledge , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[4]  S. Meiklejohn,et al.  Reaching Consensus for Asynchronous Distributed Key Generation , 2021, Distributed Computing.

[5]  Dahlia Malkhi,et al.  Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures. , 2020, CCS.

[6]  Benny Pinkas,et al.  Towards Scalable Threshold Cryptosystems , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[7]  Matthew Green,et al.  ZEXE: Enabling Decentralized Private Computation , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[8]  Ittai Abraham,et al.  HotStuff: BFT Consensus with Linearity and Responsiveness , 2019, PODC.

[9]  Dan Boneh,et al.  Compact Multi-Signatures for Smaller Blockchains , 2018, IACR Cryptol. ePrint Arch..

[10]  Eike Kiltz,et al.  The Algebraic Group Model and its Applications , 2018, IACR Cryptol. ePrint Arch..

[11]  Martin R. Albrecht,et al.  MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity , 2016, ASIACRYPT.

[12]  Jens Groth,et al.  On the Size of Pairing-Based Non-interactive Arguments , 2016, EUROCRYPT.

[13]  Nir Bitansky,et al.  From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again , 2012, ITCS '12.

[14]  Tanja Lange,et al.  High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.

[15]  Ian Goldberg,et al.  Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.

[16]  Thomas Ristenpart,et al.  The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks , 2007, EUROCRYPT.

[17]  D. Boneh,et al.  Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.

[18]  Silvio Micali,et al.  Accountable-subgroup multisignatures: extended abstract , 2001, CCS '01.

[19]  Rasmus Pagh,et al.  Cuckoo Hashing , 2001, Encyclopedia of Algorithms.

[20]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[21]  Hugo Krawczyk,et al.  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.

[22]  Rafail Ostrovsky,et al.  How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.

[23]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[24]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[25]  Yvo Desmedt,et al.  Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.

[26]  Nicholas Pippenger,et al.  On the Evaluation of Powers and Monomials , 1980, SIAM J. Comput..

[27]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[28]  A. Sonnino,et al.  Subset-optimized BLS Multi-signature with Key Aggregation , 2023, IACR Cryptol. ePrint Arch..

[29]  René Peralta NIST First Call for Multi-Party Threshold Schemes , 2023 .

[30]  Sri Aravinda Krishnan Thyagarajan,et al.  Non-interactive VSS using Class Groups and Application to DKG , 2023, IACR Cryptol. ePrint Arch..

[31]  Fatemeh Shirazi,et al.  Accountable Light Client Systems for PoS Blockchains , 2022, IACR Cryptol. ePrint Arch..

[32]  Joseph Bonneau,et al.  Powers-of-Tau to the People: Decentralizing Setup Ceremonies , 2022, IACR Cryptol. ePrint Arch..

[33]  Carla Ràfols,et al.  An Algebraic Framework for Universal and Updatable SNARKs , 2021, IACR Cryptol. ePrint Arch..

[34]  Craig Gentry,et al.  Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties , 2021, IACR Cryptol. ePrint Arch..

[35]  Jens Groth,et al.  Non-interactive distributed key generation and key resharing , 2021, IACR Cryptol. ePrint Arch..

[36]  Mary Maller,et al.  SnarkPack: Practical SNARK Aggregation , 2021, IACR Cryptol. ePrint Arch..

[37]  Benedikt Bünz,et al.  Proofs for Inner Pairing Products and Applications , 2021, ASIACRYPT.

[38]  Ariel Gabizon,et al.  PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge , 2019, IACR Cryptol. ePrint Arch..

[39]  Hoeteck Wee,et al.  Pixel: Multi-signatures for Consensus , 2019, IACR Cryptol. ePrint Arch..

[40]  Nir Bitansky,et al.  The Hunting of the SNARK , 2016, Journal of Cryptology.

[41]  Dirk Fox,et al.  Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.