-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CoSi protocol extension #76
Comments
One question I would like to discuss is the role of auditors with CONIKS+CoSi. So far, we've discussed CoSi as a possible replacement for the CONIKS auditing protocol. But the CoSi paper also makes an argument for using proactive and retroactive consistency checking in combination as a way of reducing vulnerabilities to Sybil attacks; I'm wondering if auditors could help improve the chances of detecting such attacks, or really any collusion between co-signers and the authority? |
In the current cosi implementation the "exception mechanism" is still lacking, which would be necessary for the pro-active detection. Also it would be ideal if the to-be-signed statement would be already validated in the announcement which currently isn't the case, too. This will be implemented soon (dedis/cosi#10, dedis/cosi#11, dedis/cosi#58) |
Alternatively, we can use the multisig construction based on BLS signature described in https://eprint.iacr.org/2018/483.pdf AFAIK, this ASM (Accountable-Subgroup Multi-signatures) scheme provides all the aforementioned benefits. Furthermore, it also requires only 1 round of communication between "witnesses" (the subset S out of N signers) before the signing process (the offline phase). The signing phase can be done quite efficiently by the combiner (the directory in the CONIKS case). And it has a built-in "exception mechanism" in the construction, which they call "t-of-n multisig" in the paper. It takes 4 rounds in the case of CoSi, and the whole process needs to be restarted if there were unavailable witnesses. In this ASM scheme, the set S does not have to be fixed at the beginning of the protocol, so witnesses don't need to be as highly available as CoSi's ones. The downside is that the verification needs perform 3 pairing operations (which costs more than standard Schnorr signature verification in CoSi). |
From the CoSi paper abstract:
We would like to implement CoSi as a protocol extension for CONIKS; here are some benefits we've discussed via email so far:
What would the integration look like:
cc @bford @liamsi @arlolra @c633
The text was updated successfully, but these errors were encountered: