The focus of this thesis is on threshold digital signatures and in particular on Schnorr signatures (1991). Following the expiration of its patent in 2008, Schnorr signature has gained significance in the realm of digital signatures due to its simplicity, provable security, and linear structure. Additionally, the recent NIST Internal Report on Threshold EdDSA/Schnorr signatures further supports the study of an efficient implementation of threshold Schnorr signatures. This work addresses the challenge of elucidating some key steps presented in the paper of Kondi et al. (CRYPTO 2023), which introduces the first example of a deterministic two-party Schnorr signature based on VOLEs (vector oblivious linear evaluation) which also makes effective use of the underlying cryptographic protocols through a black-box approach. More concretely, the thesis gives an explicit description of the setup phase needed for the two-party Schnorr signatures scheme given by Kondi et al. and provides a generalization of the Softspoken protocol for VOLE (Roy, CRYPTO 2022) from polynomial fields to arbitrary fields, by following the same approach described by Baum et al. (CRYPTO 2023).
The focus of this thesis is on threshold digital signatures and in particular on Schnorr signatures (1991). Following the expiration of its patent in 2008, Schnorr signature has gained significance in the realm of digital signatures due to its simplicity, provable security, and linear structure. Additionally, the recent NIST Internal Report on Threshold EdDSA/Schnorr signatures further supports the study of an efficient implementation of threshold Schnorr signatures. This work addresses the challenge of elucidating some key steps presented in the paper of Kondi et al. (CRYPTO 2023), which introduces the first example of a deterministic two-party Schnorr signature based on VOLEs (vector oblivious linear evaluation) which also makes effective use of the underlying cryptographic protocols through a black-box approach. More concretely, the thesis gives an explicit description of the setup phase needed for the two-party Schnorr signatures scheme given by Kondi et al. and provides a generalization of the Softspoken protocol for VOLE (Roy, CRYPTO 2022) from polynomial fields to arbitrary fields, by following the same approach described by Baum et al. (CRYPTO 2023).
Threshold signatures from VOLE
MARCHIORO, ALESSANDRO
2022/2023
Abstract
The focus of this thesis is on threshold digital signatures and in particular on Schnorr signatures (1991). Following the expiration of its patent in 2008, Schnorr signature has gained significance in the realm of digital signatures due to its simplicity, provable security, and linear structure. Additionally, the recent NIST Internal Report on Threshold EdDSA/Schnorr signatures further supports the study of an efficient implementation of threshold Schnorr signatures. This work addresses the challenge of elucidating some key steps presented in the paper of Kondi et al. (CRYPTO 2023), which introduces the first example of a deterministic two-party Schnorr signature based on VOLEs (vector oblivious linear evaluation) which also makes effective use of the underlying cryptographic protocols through a black-box approach. More concretely, the thesis gives an explicit description of the setup phase needed for the two-party Schnorr signatures scheme given by Kondi et al. and provides a generalization of the Softspoken protocol for VOLE (Roy, CRYPTO 2022) from polynomial fields to arbitrary fields, by following the same approach described by Baum et al. (CRYPTO 2023).File | Dimensione | Formato | |
---|---|---|---|
Threshold Signatures from VOLE.pdf
accesso riservato
Dimensione
1.5 MB
Formato
Adobe PDF
|
1.5 MB | Adobe PDF |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/61367