Abstract
Multi-signatures enable a group of t signers to sign a message jointly and obtain a single signature. Multi-signatures help validating blockchain transactions, such as transactions with multiple inputs or transactions from multisig addresses. However, multi-signatures schemes are always realised naively in most blockchain systems by directly concatenating t ECDSA signatures.
In this paper, we give the first multi-signature scheme for ECDSA. Technically, we design a new ephemeral group public key for the set of signers and introduce an interactive signing protocol to output a single ECDSA signature. The signature can be validated by the ephemeral group public key. Then, we instantiate the ECDSA multi-signature scheme with class group, for which we design a secret exchanging mechanism that ensures the hiding content is well-constructed. Moreover, our scheme is able to identify the malicious party in the signing phase and help to minimize unnecessary resource consumption. This ECDSA multi-signatures can be used in blockchain to reduce the transaction cost and provide accountability for signers and backward compatibility with existing ECDSA addresses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This is the default setting in Bitcoin for the signature hash, called SIGHASH_ALL.
- 2.
Taproot: https://en.bitcoin.it/wiki/BIP_0341. CoinJoin: https://coinjoin.io. PayJoin: https://en.bitcoin.it/wiki/PayJoin.
- 3.
The function \(\textsf{H}_1\) is defined in this way for the ease of presentation in the security proof. In practice, we can simply set \(a_i = \textsf{H}_1(i, r, \textrm{S}, m)\) for all i.
- 4.
If the message space of the additive homomorphic encryption is larger than q (e.g., Paillier encryption), then an extra zero-knowledge range proof is needed for all ciphertexts, to ensure that \(\alpha = ab - \beta \) in Step 2 is still within the message space.
- 5.
- 6.
References
Kılınç Alper, H., Burdges, J.: Two-round trip Schnorr multi-signatures via delinearized witnesses. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12825, pp. 157–188. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_7
Bagherzandi, A., Cheon, J.H., Jarecki, S.: Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. In: Ning, P., Syverson, P.F., Jha, S. (eds.) CCS 2008, pp. 449–458. ACM (2008)
Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) CCS 2006, pp. 390–399. ACM (2006)
Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31–46. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36288-6_3
Boneh, D., Drijvers, M., Neven, G.: Compact multi-signatures for smaller blockchains. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 435–464. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03329-3_15
Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 465–480. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45708-9_30
Castagnos, G., Catalano, D., Laguillaumie, F., Savasta, F., Tucker, I.: Two-party ECDSA from hash proof systems and efficient instantiations. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11694, pp. 191–221. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26954-8_7
Castagnos, G., Laguillaumie, F.: On the security of cryptosystems with quadratic decryption: the nicest cryptanalysis. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 260–277. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_15
Castagnos, G., Laguillaumie, F.: Linearly homomorphic encryption from \(\sf DDH\). In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 487–505. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16715-2_26
Chatzigiannis, P., Chalkias, K.: Proof of assets in the diem blockchain. In: Zhou, J., et al. (eds.) ACNS 2021. LNCS, vol. 12809, pp. 27–41. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-81645-2_3
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_28
Dobson, S., Galbraith, S.D.: Trustless groups of unknown order with hyperelliptic curves. IACR Cryptology ePrint Archive, p. 196 (2020). https://eprint.iacr.org/2020/196
Drijvers, M., et al.: On the security of two-round multi-signatures. In: 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, 19–23 May 2019, pp. 1084–1101. IEEE (2019). https://doi.org/10.1109/SP.2019.00050
Gennaro, R., Goldfeder, S.: Fast multiparty threshold ECDSA with fast trustless setup. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) CCS 2018, pp. 1179–1194. ACM (2018)
Gennaro, R., Goldfeder, S.: One round threshold ECDSA with identifiable abort. Cryptology ePrint Archive, Report 2020/540 (2020). https://eprint.iacr.org/2020/540
Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisignatures. NEC Res. Dev. 71, 1–8 (1983)
Khali, H., Farah, A.: DSA and ECDSA-based multi-signature schemes. Int. J. Comput. Sci. Netw. Secur. 7(7), 11–19 (2007)
Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465–485. Springer, Heidelberg (2006). https://doi.org/10.1007/11761679_28
Maxwell, G., Poelstra, A., Seurin, Y., Wuille, P.: Simple Schnorr multi-signatures with applications to Bitcoin. Des. Codes Cryptogr. 87(9), 2139–2164 (2019). https://doi.org/10.1007/s10623-019-00608-x
Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multisignatures: extended abstract. In: Reiter, M.K., Samarati, P. (eds.) CCS 2001, pp. 245–254. ACM (2001)
Nick, J., Ruffing, T., Seurin, Y.: MuSig2: simple two-round Schnorr multi-signatures. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12825, pp. 189–221. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_8
Yuen, T.H., Cui, H., Xie, X.: Compact zero-knowledge proofs for threshold ECDSA with trustless setup. In: Garay, J.A. (ed.) PKC 2021. LNCS, vol. 12710, pp. 481–511. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-75245-3_18
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Definition for Building Blocks
1.1 A.1 ECDSA
ECDSA is a variant of DSA scheme over elliptic curve. It contains a tuple of 4 algorithms \((\textsf{Setup}, \textsf{KeyGen}, \textsf{Sign}, \textsf{Verify})\). \(\textsf{Setup}(1^\lambda ) \rightarrow \textsf{params}\) generates parameters and calls \(\textsf{GGen}_\textrm{ECC}= (\mathbb {G}, G, q)\) and picks a hash function \(\textsf{H}: \{0,1\}^* \rightarrow \mathbb {Z}_q\). It returns \(\textsf{params}= (\mathbb {G}, G, q, \textsf{H})\). \(\textsf{KeyGen}(\textsf{params}) \rightarrow (\textsf{sk}, \textsf{pk})\) takes security parameter \(\textsf{params}\) as input and returns a secret key with a public key \(\textsf{pk}= xG\). \(\textsf{Sign}(\textsf{sk}, m) \rightarrow \sigma \) computes \(R = {k ^ {-1}}G\) and takes the x coordinate of R mod q as r. It computes \(s = k(\textsf{H}(m) + xr)\) mod q and returns signature \(\sigma = (r, s)\). \(\textsf{Verify}(\textsf{pk}, \sigma ) \rightarrow b\) outputs the verification result \(b \in \{0,1\}\) according to whether \(R' = {\textsf{H}(m) \cdot s ^ {-1}}G + {r s ^ {-1}}\textsf{pk}\) and the x coordinate of \(R'\) mod q is r.
1.2 A.2 Additive Homomorphic Encryption
An additive homomorphic encryption allows users to compute the sum of two message in ciphertext. It contains \((\textsf{Setup}, \textsf{KeyGen}, \textsf{Enc}, \textsf{Dec}, \textsf{EvalSum},\textsf{EvalScal}) \). \(\textsf{Setup}(1^\lambda ) \rightarrow \textsf{params}\) takes security parameters and outputs the system parameter \(\textsf{params}\). \(\textsf{KeyGen}(\textsf{params}) \rightarrow (\textsf{ek}, \textsf{dk})\) computes an encryption key and a decryption key from the system parameters. \(\textsf{Enc}_\textsf{ek}(m) \rightarrow C\) gets the encryption of a message m under the encryption key \(\textsf{ek}\) as the ciphertext C. \(\textsf{Dec}_\textsf{dk}(C) \rightarrow m\) recovers the plaintext m from the decryption key \(\textsf{dk}\). \(\textsf{EvalSum}_\textsf{ek}(C, C') \rightarrow \hat{C}\) evaluates the ciphertext \(\hat{C} = \textsf{Enc}_\textsf{ek}(a + b)\) for \(C = \textsf{Enc}_\textsf{ek}(a)\) and \(C' = \textsf{Enc}_\textsf{ek}(b)\). \(\textsf{EvalScal}_\textsf{ek}(C, s) \rightarrow C'\) scales \(C = \textsf{Enc}_\textsf{ek}(a)\) to \(C' = \textsf{Enc}_\textsf{ek}(s \cdot a)\).
The security of the additive homomorphic encryption follows the standard definition of indistinguishability against chosen plaintext attack (IND-CPA).
1.3 A.3 Trapdoor Commitment
A commitment scheme contains a algorithms tuple as \((\textsf{KeyGen}, \textsf{Com}, \textsf{Decom})\). \(\textsf{KeyGen}(1^\lambda ) \rightarrow \textsf{pk}\) generates a public key \(\textsf{pk}\). \(\textsf{Com}(\textsf{pk}, M) \rightarrow (C, D)\) takes the public key \(\textsf{pk}\) with a message M then outputs the commitment string C and decommitment string D. \(\textsf{Decom}(\textsf{pk}, C, D) \rightarrow \left\{ {M, \perp } \right\} \) takes the public key \(\textsf{pk}\), the commitment string C, the decommitment string D as input and outputs M if it succeeds and \(\perp \) otherwise.
A commitment scheme is considered secure if it fulfills the correctness, hiding and binding properties. For correctness, it requires that for all messages M and \(\textsf{pk}\leftarrow \textsf{KeyGen}(1^\lambda )\), then \(M \leftarrow \textsf{Decom}(\textsf{pk}, \textsf{Com}(\textsf{pk}, M))\). Hiding means that every message \(M_1\) and \(M_2\) and \(\textsf{pk}\leftarrow \textsf{KeyGen}(1^\lambda )\), \(\textsf{Com}(\textsf{pk}, M_1)\) and \(\textsf{Com}(\textsf{pk}, M_2)\) is statistically indistinguishable. The binding property holds if adversary \(\mathcal {A}\) wins the game with probability \(\textrm{Pr}[{\mathcal {A}\text { wins binding game}}] \le \textsf{negl}{(\lambda )}\).
Trapdoor Commitment with Efficient ZK Proof. A commitment scheme has the additional algorithms \((\textsf{KeyGen}', \textsf{TCom}, \textsf{TDecom})\) fulfilling the following. \(\textsf{KeyGen}'(1^\lambda ) \rightarrow (\textsf{pk}, \textsf{tk})\) generates a public key \(\textsf{pk}\) and a trapdoor \(\textsf{tk}\). \(\textsf{TCom}(\textsf{pk}, \textsf{tk}) \rightarrow (C, \textrm{aux})\) gives commitment C and auxiliary information \(\textrm{aux}\) such that \(\textsf{TDecom}\) could open it with any message specified. \(\textsf{TDecom}(C, \textrm{aux}, M) \rightarrow D\) give out the decommitment D by using \(\textrm{aux}\).
The additional algorithm is required to be trapdoorness. We say a commitment scheme fulfilling the trapdoorness property if for all messages M, the following distributions: \( \{(\textsf{pk}, M, C, D): \textsf{pk}\leftarrow \textsf{KeyGen}(1^\lambda ), (C, D) \leftarrow \textsf{Com}(\textsf{pk}, M)\} \) and \( \{(\textsf{pk}, M, C, D): (\textsf{pk}, \textsf{tk}) \leftarrow \textsf{KeyGen}'(1^\lambda ), (C, \textrm{aux}) \leftarrow \textsf{TCom}(\textsf{pk}, \textsf{tk}); D \leftarrow \textsf{TDecom}(C, \textrm{aux}, M)\} \) are computationally indistinguishable.
Non-malleable Equivocable Commitment Scheme. The equivocable commitment scheme additionally contains \(\textsf{KeyGen}'\) and \(\textsf{Equiv}\). \(\textsf{KeyGen}'(1^\lambda ) \rightarrow (\textsf{pk}, \textsf{tk})\) generates a public key \(\textsf{pk}\) and a trapdoor \(\textsf{tk}\). \(\textsf{Equiv}(\textsf{pk}, \textsf{tk}, C, M') \rightarrow D'\) generates decommitment string \(D'\) using trapdoor \(\textsf{tk}\) such that \(\textsf{Decom}(\textsf{pk}, C, D') = M'\).
The additional algorithm is required to be equivocable and non-malleable. A commitment scheme is called for equivocable if for all messages \(M, M'\), \((\textsf{pk}, \textsf{tk}) \leftarrow \textsf{KeyGen}'(1^\lambda )\), \((C, D) \leftarrow \textsf{Com}(\textsf{pk}, M)\) and \(D' \leftarrow \textsf{Equiv}(\textsf{pk}, \textsf{tk}, C\), \(M')\), then \(M' \leftarrow \textsf{Decom}(\textsf{pk}, C, D')\). Non-malleable means that no adversary \(\mathcal {A}\) could generate \(C'\) related to C such that the decommitment of \(C'\) is computed from M.
B Trapdoor Commitments and Its ZK Proofs
We instantiate the trapdoor commitment \(\textsf{Com}_z\) as the Pedersen commitment \(\textsf{Com}(\textsf{pk}, m) \rightarrow (C, D)\) for \(C = mG + rH\) and \(D = (m, r)\). The ZK proof in Phase 5 could be instantiated directly following the Algorithm 6 of [22]. The ZK proofs in Phase 7 and 8 follow the ZK proof in Sect. 3.3 of [15].
C Zero-Knowledge Proof for MtA(wc)
We give an informal description of assumptions used in HSM group here and refer to [22] for the complete definition. These hard assumptions are defined on prime number \(q > 2 ^ \lambda \) and HSM group \({\mathcal {G}_\textrm{HSM}}= (\mathbb {G}, \mathbb {G}^q, \mathbb {F}, g, g_q, f, \tilde{s}, q)\) for \({\mathcal {G}_\textrm{HSM}}\leftarrow \textsf{GGen}_\textrm{HSM}(1^\lambda )\). If we denote H as a generator in the ECC group with prime order q, then

We have 2 important facts in HSM group. The first one if Adaptive root subgroup hardness. Given q and HSM group \({\mathcal {G}_\textrm{HSM}}\), it’s hard to find \(u ^ \ell = w\) and \(w ^ q \ne 1\) for specific \(\ell \leftarrow \textsf{Primes}(\lambda )\). The other one is Non-trivial order hardness, which states that given q and \({\mathcal {G}_\textrm{HSM}}\), it’s hard to find \(h \ne 1 \in \mathbb {G}\) such that \(h ^ d = 1\) and \(d < q\).
Theorem 2
The protocol is an argument of knowledge in the generic group model.
Proof
We rewind the adversary on fresh challenges \(\ell \) so that each accepting transcript outputs an \((Q_1, Q_2, R_1, R_2,{P_1}, r_\rho , r_\gamma , \ell )\). Recall that we have \(C_2 \in G^q\). By the PoKRepS protocol in [22], with overwhelming probability there exists \(\rho ^*, \gamma ^* \in \mathbb {Z}\) s.t. \(\rho ^* = r_\rho \) mod \(\ell \) and \(\gamma ^* = r_\gamma \) mod \(\ell \), and \(g_q^{\rho ^*} C_2^{\gamma ^*} = S_2 \tilde{C}_2^c \). Since \(S_2 \tilde{C}_2^c = (D_2 E_2)^{q} g_q^{e_\rho } C^{e_\gamma }_2\), it implies \(\rho ^* = e_\rho \) mod q and \(\gamma ^* = e_\gamma \) mod q. Considering 2 cases, \(\textsf{pk}^{\rho ^*} C_1^{\gamma ^*} f^{u_\beta } = S_1 \tilde{C}_1^c\) is at overwhelming probability.
Next we consider the rewinding of c. The extractor obtains a pair of accepting transcripts with \((\rho ^*, \gamma ^*, u_\beta , c)\) and \((\rho ', \gamma ', u'_\beta , c')\). The extractor can compute \(\varDelta _{\rho } = \rho ^* - \rho '\), \(\varDelta _{\gamma } = \gamma ^* - \gamma '\) and \(\varDelta _{u_\beta } = u_\beta - u'_\beta \) mod q. We denote \(\rho = \frac{\varDelta _{\rho }}{\varDelta _{c}}, \gamma = \frac{\varDelta _{\gamma }}{\varDelta {c}}\) and \(\beta = \frac{\varDelta _{u_\beta }}{\varDelta _c}\) mod q. Hence we have \( \tilde{C}_1^{\varDelta _c} = (\textsf{pk}^\rho C^{\gamma }_1 f^\beta )^{\varDelta _c}. \) If \(\tilde{C}_1 \ne \textsf{pk}^\rho C^{\gamma }_1 f^\beta \), then \(\frac{\textsf{pk}^\rho f^\beta C^{\gamma }_1}{\tilde{C}_1}\) is a non-trivial element of order \(\varDelta _c < q\) which contradicts with the non-trivial element and its order in the generic group model.
As our scheme includes a sub-protocol ZKPoKRepS on input \(\tilde{C}_2\) w.r.t. bases \(g_q \in G \setminus F\). Since ZKPoKRepS is an argument of knowledge, there exists an extractor to extract the same \((\gamma , \rho )\) such that \(\tilde{C}_2 = C^\gamma _2 g^\rho _q\). Hence the extractor can output
such that
,
. \(\square \)
Theorem 3
The protocol is an honest-verifier statistically zero-knowledge argument of knowledge for relation
in the generic group model.
Proof
The simulator Sim randomly picks a challenge \(c' \in [0,q-1]\) and a prime \(\ell ' \in \textsf{Prime}(\lambda )\). It picks a random \(u'_\beta \in \mathbb {Z}_q\), \(q'_\rho , q'_\gamma \in [0, B-1]\) and \(r'_\rho , r'_\gamma \in [0, \ell '-1]\).
It finds \(d'_\rho ,d'_\gamma \in \mathbb {Z}\) and \(e'_\rho ,e'_\gamma \in [0, q-1]\) such that \( d'_\rho q + e'_\rho = q'_\rho \ell ' + r'_\rho ,\quad d'_\gamma q + e'_\gamma = q'_\gamma \ell ' + r'_\gamma . \)
It computes:
We argue that The simulated transcript is indistinguishable from a real one \((S_1, S_2, \underline{S_3}\), \(c, u_\beta , D_1, D_2, E_1,E_2, e_\rho , \ell , Q_1, Q_2,R_1,R_2, \underline{P_1}, r_\rho , r_\gamma )\) between a prover and a verifier. Sim chooses \((\ell ', c')\) identically to the honest verifier. Both \(u_\beta \) and \(u'_\beta \) are uniformly distributed in \(\mathbb {Z}_q\). \((S'_1, S'_2, \underline{S'_3}, D'_1, D'_2,E'_1, E'_2, e'_\rho , e'_\gamma )\) is uniquely defined by the other values such that the verification holds.
We compare the simulated transcript \((Q'_1, Q'_2,R'_1, R'_2,\underline{P'_1}, r'_\rho , r'_\gamma )\) and the real transcript \((Q_1, Q_2,R_1,R_2,\underline{P_1}, r_\rho , r_\gamma )\). We need to prove that, in the real protocol, independent of \(\ell \) and c, the either \(r_\rho \) or \(r_\gamma \) has a negligible statistical distance from the uniform distribution over \([0, \ell -1]\) and each one of \(\textsf{pk}^{q_\rho }, g_q^{q_\rho }, C^{q_\gamma }_1, C^{q_\gamma }_2, \underline{{q_\gamma }H}\) has negligible statistical from uniform over \( G_k =\langle \textsf{pk}\rangle , G^q\), \(G_1=\langle C_1 \rangle ,G_2 =\langle C_2 \rangle , \langle h \rangle \) respectively. In addition, each of \(Q_1, Q_2, R_1,R_2,\underline{P_1},r_\rho \), \(r_\gamma \) are independent from others. Then, the simulator produces statistically indistinguishable transcripts. The complete proof is as follows.
Consider fixed values of \(c, \rho \) and \(\ell \). In the real protocol, the prover computes \(u_\rho = c \rho + s_\rho \) where \(s_\rho \) is uniform in \([-B, B]\) and sets \(r_\rho = u_\rho \) mod \(\ell \). By Fact 1, the value of \(u_\rho \) is distributed uniformly over a range of \(2B+ 1\) consecutive integers, thus \(r_\rho \) has a statistical distance at most \(\ell /(2B + 1)\) from uniform over \([0, \ell -1]\). This bounds the distance between the real \(r_\rho \) and the simulated \(r'_\rho \), which is uniform over \([0, \ell -1]\). Similarly, \(\ell /(2B + 1)\) also bounds the distance between \(r_\gamma \) and \(r'_\gamma \)
Next, \(g_q^{q_\rho }\) is statistically indistinguishable from uniform in \(G^q\). By the triangle inequality, the statistical distance of \(q_\rho \) mod \(|G^q|\) from uniform is at most \(\frac{2^{\lambda +1}}{B} + \frac{2^{\lambda -1}|G^q|}{B+1-2^\lambda }\). We consider the joint distribution of \((\textsf{pk}^{q_\rho }, g_q^{q_\rho })\) and \(r_\rho \). Consider the conditional distribution of \(q_\rho |r_\rho \). Note that \(q_\rho = z\) if \((s_\rho - r_\rho )/\ell = z\). We repeat a similar argument as above for bounding the distribution of \(q_\rho \) from uniform. For each possible value of z, there always exists a unique value of \(s_\rho \) such that \(\left\lfloor {\frac{s_\rho }{\ell }}\right\rfloor = z\) and \(s_\rho = 0\) mod \(\ell \), except possibly at the two endpoints \(E_1, E_2\) of the range of \(q_\rho \). When \(r_\rho \) disqualifies the two points \(E_1\) and \(E_2\), then each of the remaining points \(z \notin \{E_1, E_2\}\) still have equal probability mass, and thus the probability \(\Pr (q_\rho = z|r_\rho )\) increases by at most \(\frac{1}{|Y|} - \frac{\ell }{2B+1}\), which also applies to the variable \((\textsf{pk}^{q_\rho }, g_q^{q_\rho }) |r_\rho \). Similarly, the probability \(\Pr (q_\gamma = z|r_\gamma )\) increases by at most \(\frac{1}{|Y|} - \frac{\ell }{2B+1}\), which also applies to the variable \((\textsf{pk}^{q_\gamma }, g_q^{q_\gamma }, \underline{h^{q_\gamma }}) |r_\gamma \).
We can compare the joint distributions \(X'_\rho = (\textsf{pk}^{q_\rho }, g_q^{q_\rho }, r_\rho )\) to the simulated distribution \(Y'_\rho = (\textsf{pk}^{q'_\rho }, g_q^{q'_\rho }, r'_\rho )\) using Fact 3.

Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Pan, S., Chan, K.Y., Cui, H., Yuen, T.H. (2022). Multi-signatures for ECDSA and Its Applications in Blockchain. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds) Information Security and Privacy. ACISP 2022. Lecture Notes in Computer Science, vol 13494. Springer, Cham. https://doi.org/10.1007/978-3-031-22301-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-22301-3_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-22300-6
Online ISBN: 978-3-031-22301-3
eBook Packages: Computer ScienceComputer Science (R0)