Asynchronous Distributed Key Generation for Computationally Secure Randomness, Consensus, and Threshold Signatures

ACM Conference on Computer and Communications Security (CCS)


In this paper, we present the first Asynchronous Distributed Key Generation (ADKG) algorithm which is also the first distributed key generation algorithm that can generate cryptographic keys with a dual (๐‘“, 2๐‘“ + 1)โˆ’threshold (where ๐‘“ is the number of faulty parties). As a result, using our ADKG we remove the trusted setup assumption that the most scalable consensus algorithms make. In order to create a DKG with a dual (๐‘“, 2๐‘“ + 1)โˆ’threshold we first answer in the affirmative the open question posed by Cachin et al. [7] on how to create an Asynchronous Verifiable Secret Sharing (AVSS) protocol with a reconstruction threshold of ๐‘“ + 1 < ๐‘˜ โ‰ค 2๐‘“ + 1, which is of independent interest. Our High-threshold-AVSS (HAVSS) uses an asymmetric bivariate polynomial to encode the secret. This enables the reconstruction of the secret only if a set of ๐‘˜ nodes contribute while allowing an honest node that did not participate in the sharing phase to recover his share with the help of ๐‘“ + 1 honest parties.

Once we have HAVSS we can use it to bootstrap scalable partially synchronous consensus protocols, but the question on how to get a DKG in asynchrony remains as we need a way to produce common randomness. The solution comes from a novel Eventually Perfect Common Coin (EPCC) abstraction that enables the generation of a common coin from ๐‘› concurrent HAVSS invocations. EPCCโ€™s key property is that it is eventually reliable, as it might fail to agree at most ๐‘“ times (even if invoked a polynomial number of times). Using EPCC we implement an Eventually Efficient Asynchronous Binary Agreement (EEABA) which is optimal when the EPCC agrees and protects safety when EPCC fails.

Finally, using EEABA we construct the first ADKG which has the same overhead and expected runtime as the best partially synchronous DKG (๐‘‚(๐‘›4) words, ๐‘‚(๐‘“) rounds). As a corollary of our ADKG, we can also create the first Validated Asynchronous Byzantine Agreement (VABA) that does not need a trusted dealer to setup threshold signatures of degree ๐‘› โˆ’ ๐‘“. Our VABA has an overhead of expected ๐‘‚(๐‘›2) words and ๐‘‚(1) time per instance, after an initial ๐‘‚(๐‘›4) words and ๐‘‚(๐‘“) time bootstrap via ADKG.

Latest Publications