Score:1

Question about Threshold signature scheme "GG18"

mg flag

I recently read the article on the threshold signature scheme “Fast Multiparty Threshold ECDSA with Fast Trustless Setup” and I have a question.

In the key generation section, each player $P_i$ selects $u_i$ and then performs a $(t, n)$ Feldman-VSS of the $u_i$ value. In this case, other participants can make use of Lagrange interpolation to construct the polynomial related to $P_i$, and they can reconstruct $u_i$ value. Therefore, the values of $u_i$ of all players can be reconstructed and the adversary participants can obtain the value of the private key.

$$ X = \sum u_i $$

While the private key should not be reconstructable. For example, if we suppose 4 participants include [Alice, Bob, Carol and Dave] and we want to have $(4,3)$ Tss. In fact 3 people can perform signing. Alice put her $u_i$ value on a quadratic polynomial and performs $(4, 3)$ Feldman’s Vss. So Bob,Carol and Dave can reconstruct Alice’s Polynomial and They can obtain her $u_i$

In this way, participants can reconstruct all of others’ $u_i$ . Due to the fact that Private key

$$ X = \sum u_i = u_{\text{Alice}} + u_{\text{Bob}} + u_{\text{Carol}} + u_{\text{Dave}} $$

they can obtain Private key.

Please guide me on this subject.

Score:0
ng flag

The referenced paper describes a $(t, n)$ threshold signature scheme. That is a signature scheme where any $t+1$ out of $n$ parties can generate a signature by working together. In such a scheme then the assumption will be that at most $t$ out of the $n$ parties are malicious. Clearly if more than $t$ parties are malicious then they can sign whatever they want by design.

During key generation the parties will indeed choose and $(t, n)$ VSS-share a private value $u_i$, later leading to a $(t, n)$ Shamir sharing of the signing key $x$ with each party holding a share $x_i$.

Now due to the assumption that at most $t$ parties are malicious, no $t+1$ parties will collaborate and be able to reconstruct the secret key $x$ directly from their shares $(x_i)$. Nor will there be enough malicious parties to reconstruct each party's $u_i$, to indirectly reconstruct the secret key $x$.

There is another potential source of confusion, based on your message:

For example, if we suppose 4 participants include [Alice, Bob, Carol and Dave] and we want to have $(4,3)$ Tss. In fact 3 people can perform signing. Alice put her $u_i$ value on a quadratic polynomial and performs $(4,3)$ Feldman’s Vss.

In a $(t, n)$ secret sharing it has to hold that $t < n$, so the notation $(4, 3)$ makes no sense. I assume you meant a $(3, 4)$ sharing, where $3 + 1 = 4$ (out of $4$) parties are required to reconstruct the value?

If so then the sharing would involve a polynomial of degree $3$ (thus requiring $4$ shares to reconstruct). And since we here assume that at most $t = 3$ parties are malicious, they cannot do so.

(As an aside: The described scheme claims to work even in the case of a dishonest majority, that is they only require that $t < n$. If embedded in a larger system, other components might impose stricter requirements, such as $t < 2n$ or $t < 3n$.)

I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.