With all the current interest in personal data ownership, there is a growing need for better security, freedom and control for online users. Along with this, a counter-movement of decentralized applications where no single entity controls the system has started to grow. Over the two last decades many distributed (cryptographic) schemes have been designed and deployed in the real world in the quest to build a decentralized web.
Although these topics are discussed in the literature (e.g. threshold cryptographic schemes), most current solutions lack the robustness necessary for real-world usage: many protocols require that any failure results in restarting the process and consequently the threshold may need to be changed.
The goals of this workshop are to review the state-of-the-art research and practices, discuss existing challenges in terms of security and performance, and to trigger new research directions to tackle the challenges.
Topics such as distributed key generation, threshold cryptography, and multiparty computation will be presented in the workshop and in a concluding panel issues such as setups, robustness, and reconfigurability of cryptographic schemes when they are deployed in decentralized real-world conditions will be discussed.
Aniket Kate - Purdue University
Fatemeh Shirazi - Web3 Foundation
Registration: The workshop will take place online. Attendance to the workshop is free of charge
Date: January 15, 2021
Tentative Schedule (all times are in CET)
3:00 pm — 3:15 pmAniket Kate and Fatemeh ShiraziIntroduction and OrganizationPurdue University, Web3 Foundation
3:15 pm — 3:45 pmOmer ShlomovitsBaby Sharks: small subgroup attacks on DKG implementationsZenGo XAbstract
We will show how injecting small order subgroup elements can bypass security for cryptographic primitives used in DKGs such as VSS and sigma protocols. We discuss the potential damage of our attacks on applications such as consensus and random beacon.Watch video
3:45 pm — 4:15 pmJeffrey BurdgesVerifiable LuckWeb3 FoundationAbstract
As reusable PRFs, VRFs provide a wondrous flexibility for distributed systems. We give an applied perspective on verifiable random functions (VRFs), including fun examples, intuition for proper usage, miss-use resistance, and implementation.Watch video
4:15 pm — 4:45 pmEleftherios Kokoris-KogiasAsynchronous Distributed Key Generation for Computational Secure Randomness, Consensus and Threshold SignaturesIST Austria & Novi ResearchAbstract
Asynchronous Distributed Key Generation (ADKG) algorithm is the first algorithm that generates cryptographic keys with a dual (f, 2f+1)-threshold. ADKG removes the trusted setup that consensus and MPC protocols need.Watch video
4:45 pm — 5:15 pmMary MallerAggregatable Distributed Key GenerationEthereum FoundationAbstract
We present a distributed key generation protocol with aggregatable and publicly-verifiable transcripts that reduces the size of the final transcript and time to verify by leveraging gossip rather than all-to-all communication.Watch video
5:15 pm — 5:45 pmAlin TomescuTowards Scalable Threshold CryptosystemsVMware ResearchAbstract
We will present new techniques for authenticating polynomial evaluations that help scale threshold signature schemes, verifiable secret sharing and distributed key generation protocols to hundreds of thousands of participants and beyond.Watch video
5:45 pm — 7:00 pmPanel - Decentralized Cryptography: A Distant Dream or an Immediate Possibility?Ittai IbrahimVMware ResearchAndrew MillerUniversity of Illinois, Urbana-ChampaignChristian CachinUniversity of BernHarry HalpinNym TechnologiesHost: Aniket KatePurdue UniversityWatch video
7:00 pm — 7:05 pmFatemeh Shirazi, Aniket KateClosing RemarksWeb3 Foundation, Purdue University