Threshold Signatures

Paper: Threshold Signatures. Chelsea Komlo. 2024

Summary

This article talks about

  • signature schemes
  • threshold signature schemes
  • generating with a trusted dealer and DKG protocol
  • applications
  • case studies: Threshold ECDSA and BLS

Benefits of Threshold Signature Schemes

  1. Redundancy
  2. Corruption Resilience

Applications of threshold signatures

Applications of threshold signatures (generally wherever trusted signatures are needed):

  • Cryptocurrency wallets
  • Certificate authorities: The signing key of a CA is critical.
  • Consensus validators: To make signatures compact.
  • Code signing packages: Package managers signing packages and updates (App Stores, OS updates, etc.)

Case Study: Threshold ECDSA

They say FROST FROST: Flexible Round-Optimized Schnorr Threshold Signatures. Chelsea Komlo, and Ian Goldberg. 20201 is a simple example for EdDSA. FROST allows issuing Schnorr Signatures, therefore can easily do EdDSA signatures since it is a variant of Schnorr. Signing needs:

  • two online rounds
  • batch preprocessing + one online round

FROST protects against concurrency attacks that were not considered previously. FROST is not robust, i.e., there is no signature even if one signer fails. ROAST ROAST: Robust Asynchronous Schnorr Threshold Signatures. Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, and Dominique Schröder. 2022 is a wrapper protocol that can be used along with FROST to get a robust signature scheme. FROST has a IETF draft which is nearing completion.

Threshold BLS

As opposed to threshold EdDSA, we can generate threshold BLS signatures in a single non-interactive round. It is also robust.

Practical considerations

Some applications use: two out of three (e.g., cryptocurrency wallets) Threshold signatures allows key rotation, i.e., changing the secret key shares while keeping the public key constant. This is not possible in a single party setting. Key rotation is also called proactive security.

News

NIST is trying to formalize existing threshold signature schemes. Post-quantum threshold signature scheme is an active area.

References

Chelsea Komlo. 2024. “Threshold Signatures.” https://ieeexplore.ieee.org/document/10799187/?arnumber=10799187.
Chelsea Komlo, and Ian Goldberg. 2020. “FROST: Flexible Round-Optimized Schnorr Threshold Signatures.” https://eprint.iacr.org/2020/852.
Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, and Dominique Schröder. 2022. “ROAST: Robust Asynchronous Schnorr Threshold Signatures.” https://eprint.iacr.org/2022/550.

Footnotes:

1

the first author of FROST is also the author of this article