谷歌Chrome浏览器插件
订阅小程序
在清言上使用

How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures

IACR Cryptol. ePrint Arch.(2021)

引用 1|浏览7
暂无评分
摘要
In this paper, we present new techniques for proving the security of multiand threshold signature schemes under discrete logarithm assumptions in the random oracle model. The purpose is to provide a simple framework for analyzing the relatively complex interactions of these schemes in a concurrent model, thereby reducing the risk of attacks. We make use of proofs of possession and prove that a Schnorr signature suffices as a proof of possession in the algebraic group model without any tightness loss. We introduce and prove the security of a simple, three-round multisignature SimpleMuSig. Using our new techniques, we prove the concurrent security of a variant of the MuSig2 multisignature scheme that includes proofs of possession as well as the FROST threshold signature scheme. These are currently the most efficient schemes in the literature for generating Schnorr signatures in a multiparty setting. Our variant of MuSig2, which we call SpeedyMuSig, has faster key aggregation due to the proofs of possession.
更多
查看译文
关键词
threshold signatures,schnorr assuming schnorr,security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要