Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reduced-complexity DKG #132

Closed
kayabaNerve opened this issue Oct 16, 2022 · 4 comments
Closed

Reduced-complexity DKG #132

kayabaNerve opened this issue Oct 16, 2022 · 4 comments
Labels
cryptography An issue involving cryptography/a cryptographic library improvement This could be better

Comments

@kayabaNerve
Copy link
Member

https://eprint.iacr.org/2022/1389.pdf details a DKG which they claim runs in O(n) without faults, yet in O(n log n) with arbitrary faults.

The existing DKG operates in O(n^2), and moving to O(n) is possible yet while introducing malleability which presumably violates the safety of the protocol.

We will prove in §5.3 that this approach ensures correctness, i.e., nodes always output the correct ADKG public key and threshold public keys.

The transformation in this paper is proven to be correct.

While this details a network protocol, which we don't need as we report coordination back to Substrate which uses Tendermint, the cryptographic performance gain would be massive. For 500 validators, it'd move from 250k point muls to just 4483 (assuming log2).

@kayabaNerve kayabaNerve added improvement This could be better cryptography An issue involving cryptography/a cryptographic library labels Oct 16, 2022
@kayabaNerve
Copy link
Member Author

https://eprint.iacr.org/2023/992 relevant.

@kayabaNerve
Copy link
Member Author

https://eprint.iacr.org/2024/876 achieves O(1) per-party upload/download. For our use case, it'd be O(1) upload with O(n) download (ignoring the complexity of gossip and Tendermint). This would let us greatly reduce max Tributary TX sizes (tightening our DoS resilience).

It does have a constant round complexity (comparable to current) as well.

Assuming the academia holds up, it should be the clear-winner unless the constant size ends up as several kB?

@kayabaNerve kayabaNerve changed the title O(n log n) DKG Reduced-complexity DKG Jun 10, 2024
@kayabaNerve
Copy link
Member Author

The one-round DKG (#589) we have now is quite good, despite still being linear. O(1) code via experimental lattice cryptography can definitely take a backseat.

@kayabaNerve
Copy link
Member Author

While this can still count as a long-term goal, the current DKG is great. I don't expect a less-bandwidth robust DKG, with cryptography we're able to implement and willing to use, to come any time soon and it's definitely no longer a priority.

@kayabaNerve kayabaNerve closed this as not planned Won't fix, can't repro, duplicate, stale Sep 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cryptography An issue involving cryptography/a cryptographic library improvement This could be better
Projects
None yet
Development

No branches or pull requests

1 participant