Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Notes on Threshold EdDSA/Schnorr Signatures

View through CrossRef
This report considers threshold signature schemes interchangeable with respect to the verification mechanism of the Edwards-Curve Digital Signature Algorithm (EdDSA). Historically, EdDSA is known as a variant of Schnorr signatures, which are well-studied and suitable for efficient thresholdization, i.e., for being computed when the private signing key is secret-shared across multiple parties. In the threshold setting, signatures remain unforgeable even if up to some threshold number of the cosigners become compromised. The report analyzes the conventional (non-threshold) EdDSA specification from Draft FIPS 186-5, reviews important security properties, with an emphasis on strong unforgeability, and distinguishes various approaches for corresponding threshold schemes. Notably, while providing better security assurances, threshold signatures can be used as drop-in replacement for conventionally produced signatures, without changing legacy code for verification of authenticity. The report identifies various challenges and questions that would benefit from more attention, are of interest for future guidance and recommendations, and may be applicable beyond EdDSA.
National Institute of Standards and Technology
Title: Notes on Threshold EdDSA/Schnorr Signatures
Description:
This report considers threshold signature schemes interchangeable with respect to the verification mechanism of the Edwards-Curve Digital Signature Algorithm (EdDSA).
Historically, EdDSA is known as a variant of Schnorr signatures, which are well-studied and suitable for efficient thresholdization, i.
e.
, for being computed when the private signing key is secret-shared across multiple parties.
In the threshold setting, signatures remain unforgeable even if up to some threshold number of the cosigners become compromised.
The report analyzes the conventional (non-threshold) EdDSA specification from Draft FIPS 186-5, reviews important security properties, with an emphasis on strong unforgeability, and distinguishes various approaches for corresponding threshold schemes.
Notably, while providing better security assurances, threshold signatures can be used as drop-in replacement for conventionally produced signatures, without changing legacy code for verification of authenticity.
The report identifies various challenges and questions that would benefit from more attention, are of interest for future guidance and recommendations, and may be applicable beyond EdDSA.

Related Results

Manual and Machine Learning Approaches for Classifying Real and Forged Signatures—A Comparative Study and Forensic Implications
Manual and Machine Learning Approaches for Classifying Real and Forged Signatures—A Comparative Study and Forensic Implications
ABSTRACTA handwritten signature is one of the forms of a biometric measure that creates an individual identity of the persons to mark their approval related to any document. The ma...
Analysis of the Cross-Study Replicability of Tuberculosis Gene Signatures Using 49 Curated Transcriptomic Datasets
Analysis of the Cross-Study Replicability of Tuberculosis Gene Signatures Using 49 Curated Transcriptomic Datasets
Background Tuberculosis (TB) is the leading cause of infectious disease mortality worldwide. Numerous blood-based gene expression signatures have been proposed in...
Correlation of Mutational Signatures in Cancer Genes with General Signatures
Correlation of Mutational Signatures in Cancer Genes with General Signatures
The occurrence of various mutation patterns, such as changes in the DNA sequence and the loss of some sequences, is called a “mutational signature,” and they represent the molecula...
TANDA TANGAN DIGITAL BERBASIS ANDROID
TANDA TANGAN DIGITAL BERBASIS ANDROID
Tanda tangan tidak  hanya digunakan untuk menjaga dan menjamin kredibilitas data tetapi juga untuk menghindari sumpah serapah dari pertemuan yang bersangkutan. Dalam kriptografi, a...
The Fractures Optimization Method with the Threshold Pressure of Multistage Fracturing in Tight Oil Reservoir
The Fractures Optimization Method with the Threshold Pressure of Multistage Fracturing in Tight Oil Reservoir
Abstract As permeability of tight oil reservoir is generally less than 0.1md, diameters of pore throats are primarily at the micrometer- and nanometer-scale. Differe...
Detecting presence of mutational signatures in cancer with confidence
Detecting presence of mutational signatures in cancer with confidence
AbstractCancers arise as the result of somatically acquired changes in the DNA of cancer cells. However, in addition to the mutations that confer a growth advantage, cancer genomes...
Clinical Feature-Related Single-Base Substitution Sequence Signatures Identified with an Unsupervised Machine Learning Approach
Clinical Feature-Related Single-Base Substitution Sequence Signatures Identified with an Unsupervised Machine Learning Approach
Abstract Background: Mutation processes leave different signatures in genes. For single-base substitutions, previous studies have suggested that mutation signatures are not...

Back to Top