Sourav Das, University of Illinois Urbana-Champaign
Zhuolun Xiang, Aptos Labs
Ling Ren, University of Illinois Urbana-Champaign
Abstract
The -Strong Diffie-Hellman (-SDH) parameters are foundational to efficient constructions of many cryptographic primitives such as zero-knowledge succinct non-interactive arguments of knowledge, polynomial/vector commitments, verifiable secret sharing, and randomness beacon. The only existing method to generate these parameters securely is highly sequential, requires synchrony assumptions, and has very high communication and computation costs. For example, to generate parameters for any given , each party incurs a communication cost of and requires rounds. Here is the number of parties in the secure multiparty computation protocol. Since is typically large, i.e., on the order of billions, the cost is highly prohibitive.
In this paper, we present a distributed protocol to generate -SDH parameters in an asynchronous network. In a network of parties, our protocol tolerates up to one-third of malicious parties. Each party incurs a communication cost of and the protocol finishes in expected rounds. We provide a rigorous security analysis of our protocol. We implement our protocol and evaluate it with up to 128 geographically distributed parties. Our evaluation illustrates that our protocol is highly scalable and results in a 2-6 better runtime and 4-13 better per-party bandwidth usage compared to the state-of-the-art synchronous protocol for generating -SDH parameters.
@misc{cryptoeprint:2022/1683,
author = {Sourav Das and Zhuolun Xiang and Ling Ren},
title = {Powers of Tau in Asynchrony},
howpublished = {Cryptology {ePrint} Archive, Paper 2022/1683},
year = {2022},
url = {https://eprint.iacr.org/2022/1683}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.