Hierarchical Threshold Signature Scheme
This is Hierarchical Threshold Signature Scheme (HTSS) worked by AMIS. Comparing to Threshold Signature Scheme (TSS), shares in this scheme are allowed to have different ranks.
The main merit of HTSS is vertical access control such that it has “partial accountability”. Although TSS achieves joint control to disperse risk among the participants, the level of all shares are equal. It is impossible to distinguish which share getting involved in an unexpected signature. TSS is not like the multi-signature scheme as the signature is signed by distinct private keys in multi-signature scheme. It is because Shamir’s secret sharing only supports horizontal access control.
For example, an important contract not only requires enough signatures, but also needs to be signed by a manager. Despite the fact that vertical access control can be realized on the application layer and tracked by an audit log. Once a hack happens, we will have no idea about who to blame for. However, in HTSS framework, through assigning different ranks of each share induces that any valid signature generated includes the share of the manager.
HTSS has been developed by Tassa and other researchers many years ago. In our implementation, we setup up this theory on TSS(i.e. just replace Lagrange Interpolation to Birkhoff Interpolation).
Now, Alice supports two parts:
verichanis, tssshock:
They mentioned three security issues.
a. Weaknesses in using ambiguous encoding scheme (alpha shuffle):
Our implementation of GG18 and CGGMP adapts the Google protobuf, so our implementation is essentially immune to this attack.
b. c-split:
The version of our GG18 is secure according to Theorem 2 in the GG18. We follow the suggestion of GG18 to substitute sMTA for mta and mta with check. So, we do not implement
this proof in our GG18.
c. c-guess:
We do not implement dlnproof in GG18 as described in the case b.
Our iteration of the zkproof in CGGMP is at least 80. ref [here](https://github.com/getamis/alice/blob/cf43552c510499e5e797bc06e855a8f2086408b0/crypto/homo/paillier/paillier.go#L43). If necessary, this value can be adjusted to 128. However, in practical terms, using 80 or above is considered reasonable.
Alice has been audited by Kudelski Security.
(GG18 And CCLST) The details can be found in here.
Algorithm: The algorithms can be downloaded in here.
(FROST And CGGMP) The details can be found in here.
Algorithm: The algorithms can be downloaded in here.
Although the fist part of Alice has been audited, you should still be careful to use it.
If you have more questions, you can connect us directly without any hesitation.
Wallet: Qubic
Thanks to