Paper 2024/1469

Password-Protected Threshold Signatures

Stefan Dziembowski, University of Warsaw
Stanislaw Jarecki, University of California, Irvine
Paweł Kędzior, University of Warsaw
Hugo Krawczyk, Amazon, USA
Chan Nam Ngo, Privacy + Scaling Explorations, Vietnam
Jiayu Xu, Oregon State University
Abstract

We witness an increase in applications like cryptocurrency wallets, which involve users issuing signatures using private keys. To protect these keys from loss or compromise, users commonly outsource them to a custodial server. This creates a new point of failure, because compromise of such a server leaks the user’s key, and if user authentication is implemented with a password then this password becomes open to an offline dictionary attack (ODA). A better solution is to secret-share the key among a set of servers, possibly including user’s own device(s), and implement password authentication and signature computation using threshold cryptography. We propose a notion of augmented password protected threshold signature scheme (aptSIG) which captures the best possible security level for this setting. Using standard threshold cryptography techniques, i.e. threshold password authentication and threshold signatures, one can guarantee that compromising up to t out of n servers reveals no information on either the key or the password. However, we extend this with a novel property, namely that compromising even all n servers also does not leak any information, except via an unavoidable ODA attack, which reveals the key (and the password) only if the attacker guesses the password. We define aptSIG in the Universally Composable (UC) framework and show that it can be constructed very efficiently, using a black-box composition of any UC threshold signature and a UC augmented Password-Protected Secret Sharing (aPPSS), which we define as an extension of prior notion of PPSS. As concrete instantiations we obtain secure aptSIG schemes for ECDSA and BLS signatures with very small overhead over the respective threshold signature. Finally, we note that both the notion and our generic solution for augmented password-protected threshold signatures can be generalized to password-protecting MPC for any keyed functions.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in ASIACRYPT 2024
Keywords
PasswordsThreshold SignaturesThreshold CryptosystemsPassword-Protected Secret-SharingUniversal Composability
Contact author(s)
s dziembowski @ mimuw edu pl
stanislawjarecki @ gmail com
p kedzior @ mimuw edu pl
hugokraw @ gmail com
namncc @ pse dev
xujiay @ oregonstate edu
History
2024-09-22: revised
2024-09-19: received
See all versions
Short URL
https://ia.cr/2024/1469
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1469,
      author = {Stefan Dziembowski and Stanislaw Jarecki and Paweł Kędzior and Hugo Krawczyk and Chan Nam Ngo and Jiayu Xu},
      title = {Password-Protected Threshold Signatures},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1469},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1469}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.