TY - GEN
T1 - Long Live The Honey Badger
T2 - 32nd USENIX Security Symposium, USENIX Security 2023
AU - Yurek, Thomas
AU - Xiang, Zhuolun
AU - Xia, Yu
AU - Miller, Andrew
N1 - In this work, we designed and implemented three asynchronous DPSS schemes, each of which achieved new asymptotic bounds while also incorporating useful new properties such as supporting high privacy thresholds. Moreover, we demonstrated that asynchronous and robust DPSS protocols can compete with prior work in good-case scenarios and outperform them in the presence of faults. Leveraging this, we recalled prior applications which used DPSS and show how they how they can be better equipped to handle more adversarial environments. We additionally used batch-amortized DPSS to refresh and transfer precomputed data in a novel "BMR escape hatch". We hope that these advancements allow future practitioners to build awesome resilient applications for use on a decentralized internet. Acknowledgements. We thank Matthieu Rambaud, Antoine Urban, and our anonymous shepherd for technical discussions related to this paper. This work was funded in part by NSF award #1943499 and by IC3 industry partners.
PY - 2023
Y1 - 2023
N2 - Secret sharing is an essential tool for many distributed applications, including distributed key generation and multiparty computation. For many practical applications, we would like to tolerate network churn, meaning participants can dynamically enter and leave the pool of protocol participants as they please. Such protocols, called Dynamic-committee Proactive Secret Sharing (DPSS) have recently been studied; however, existing DPSS protocols do not gracefully handle faults: the presence of even one unexpectedly slow node can often slow down the whole protocol by a factor of O(n). In this work, we explore optimally fault-tolerant asynchronous DPSS that is not slowed down by crash faults and even handles byzantine faults while maintaining the same performance. We first introduce the first high-threshold DPSS, which offers favorable characteristics relative to prior non-synchronous works in the presence of faults while simultaneously supporting higher privacy thresholds. We then batch-amortize this scheme along with a parallel non-high-threshold scheme which achieves optimal bandwidth characteristics. We implement our schemes and demonstrate that they can compete with prior work in best-case performance while outperforming it in non-optimal settings.
AB - Secret sharing is an essential tool for many distributed applications, including distributed key generation and multiparty computation. For many practical applications, we would like to tolerate network churn, meaning participants can dynamically enter and leave the pool of protocol participants as they please. Such protocols, called Dynamic-committee Proactive Secret Sharing (DPSS) have recently been studied; however, existing DPSS protocols do not gracefully handle faults: the presence of even one unexpectedly slow node can often slow down the whole protocol by a factor of O(n). In this work, we explore optimally fault-tolerant asynchronous DPSS that is not slowed down by crash faults and even handles byzantine faults while maintaining the same performance. We first introduce the first high-threshold DPSS, which offers favorable characteristics relative to prior non-synchronous works in the presence of faults while simultaneously supporting higher privacy thresholds. We then batch-amortize this scheme along with a parallel non-high-threshold scheme which achieves optimal bandwidth characteristics. We implement our schemes and demonstrate that they can compete with prior work in best-case performance while outperforming it in non-optimal settings.
UR - http://www.scopus.com/inward/record.url?scp=85176498558&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85176498558&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85176498558
T3 - 32nd USENIX Security Symposium, USENIX Security 2023
SP - 5413
EP - 5430
BT - 32nd USENIX Security Symposium, USENIX Security 2023
PB - USENIX Association
Y2 - 9 August 2023 through 11 August 2023
ER -