Paper 2023/1019

The many faces of Schnorr

Victor Shoup, DFINITY
Abstract

Recently, a number of highly optimized threshold signing protocols for Schnorr signatures have been proposed. While these proposals contain important new techniques, some of them present and analyze these techniques in very specific contexts, making it less than obvious how these techniques can be adapted to other contexts (and perhaps combined with one another). The main goal of this paper is to abstract out and extend in various ways some of these techniques, building a toolbox of techniques that can be easily combined in different ways and in different contexts. To this end, we present security results for various "enhanced" modes of attack on the Schnorr signature scheme in the non-distributed setting. These results support a modular approach to protocol design and analysis in which one reduces the security of a distributed signing protocol to such an enhanced attack mode in the non-distributed setting. We show how these results can be used to easily design new threshold Schnorr protocols that enjoy better security and/or performance properties than existing ones.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
digital signatureSchnorr signaturethreshold cryptographygeneric group model
Contact author(s)
victor @ shoup net
History
2024-04-08: last of 4 revisions
2023-06-30: received
See all versions
Short URL
https://ia.cr/2023/1019
License
Creative Commons Attribution-NonCommercial-NoDerivs
CC BY-NC-ND

BibTeX

@misc{cryptoeprint:2023/1019,
      author = {Victor Shoup},
      title = {The many faces of Schnorr},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/1019},
      year = {2023},
      url = {https://eprint.iacr.org/2023/1019}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.