You are looking at a specific version 20220225:081240 of this paper. See the latest version.

Paper 2022/241

Coalition and Threshold Hash-Based Signatures

John Kelsey and Stefan Lucks

Abstract

We show how to construct a threshold version of stateful hash-based signature schemes like those defined in XMSS (defined in RFC8391) and LMS (defined in RFC8554). Our techniques assume a trusted dealer and secure point-to-point communications; are efficient in terms of communications and computation; and require at least one party to have a large (but practical) amount of storage. We propose the addition of an untrusted Helper to manage the large storage required without being given access to any secret information. We prove the security of our schemes in a straightforward way, reducing their strength to that of the underlying hash-based signature scheme. Our schemes are quite practical, and substantially decrease the risk of accidental key reuse in hash-based signature schemes.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
threshold cryptographyhash functionshash-based signatures
Contact author(s)
john kelsey @ nist gov
History
2022-07-13: revised
2022-02-25: received
See all versions
Short URL
https://ia.cr/2022/241
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.