Practical Distributed Key Generation and Signatures

dc.contributor.authorKomlo, Chelsea
dc.date.accessioned2026-04-16T20:01:55Z
dc.date.available2026-04-16T20:01:55Z
dc.date.issued2026-04-16
dc.date.submitted2026-03-18
dc.description.abstractThreshold schemes are a critical cryptographic primitive that allows a set of n total parties and a threshold of at least tparties to collaborate to jointly perform some function, such as generating key material or issuing a digital signature. Threshold schemes allow for improved robustness in the case of failure, and distribute trust among many parties. In particular, the security of the scheme assumes t−1 players are corrupted, and so can deviate arbitrarily from the protocol. The security of the scheme ensures that in spite of a subset of corrupted players, the scheme can provide important properties such as robustness, unforgeability, or indistiguishability from some target distribution. In this work, we examine the special cases of distributed key generation and threshold signing. In particular, we present constructions that optimize for considerations that are important to implementations in practice. Such considerations include simplicity, network round efficiency, computational and bandwidth efficiency, and low use of broadcast channels. Firstly, we present FROST, a Flexible Round-Optimized Schnorr Threshold signature scheme. FROST improves upon prior threshold Schnorr signature schemes in that signatures can be generated with only two network rounds among participants, while remaining secure against concurrent adversaries. We show that FROST is secure under the Algebraic One-More Discrete Logarithm (ℓ-AOMDL) assumption in the Random Oracle Model (ROM). Secondly, we present Storm, a simplified three-round distributed key generation protocol (DKG). Storm presents a simplified alternative to prior DKGs with a similar security model, assuming the Discrete Logarithm Problem (DLP) is hard, and provides a generic construction that may be applicable beyond discrete-logarithm assumptions. Finally, we present Arctic, a two-round deterministic threshold Schnorr signature scheme. Arctic allows signers to remain stateless, with the exception of persisting state of their long-lived signing keys. Arctic requires a slightly weaker trust model in that it assumes the majority of signers are honest, but shows improved efficiency over alternative deterministic threshold Schnorr signature schemes for small signing coalitions (fewer than 25 signers). We show that Arctic is secure assuming DLP in the ROM.
dc.identifier.urihttps://hdl.handle.net/10012/23007
dc.language.isoen
dc.pendingfalse
dc.publisherUniversity of Waterlooen
dc.titlePractical Distributed Key Generation and Signatures
dc.typeDoctoral Thesis
uws-etd.degreeDoctor of Philosophy
uws-etd.degree.departmentDavid R. Cheriton School of Computer Science
uws-etd.degree.disciplineComputer Science
uws-etd.degree.grantorUniversity of Waterlooen
uws-etd.embargo.terms0
uws.contributor.advisorGoldberg, Ian
uws.contributor.advisorStebila, Douglas
uws.contributor.affiliation1Faculty of Mathematics
uws.peerReviewStatusUnrevieweden
uws.published.cityWaterlooen
uws.published.countryCanadaen
uws.published.provinceOntarioen
uws.scholarLevelGraduateen
uws.typeOfResourceTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Komlo_Chelsea.pdf
Size:
985.37 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
6.4 KB
Format:
Item-specific license agreed upon to submission
Description: