Skip to main content

Efficient verifiable secret sharing with share recovery in BFT protocols

Publication ,  Conference
Basu, S; Malkhi, D; Tomescu, A; Reiter, MK; Abraham, I; Sirer, EG
Published in: Proceedings of the ACM Conference on Computer and Communications Security
November 6, 2019

Byzantine fault tolerant state machine replication (SMR) provides powerful integrity guarantees, but fails to provide any privacy guarantee whatsoever. A natural way to add such privacy guarantees is to secret-share state instead of fully replicating it. Such a combination would enable simple solutions to difficult problems, such as a fair exchange or a distributed certification authority. However, incorporating secret shared state into traditional Byzantine fault tolerant (BFT) SMR protocols presents unique challenges. BFT protocols often use a network model that has some degree of asynchrony, making verifiable secret sharing (VSS) unsuitable. However, full asynchronous VSS (AVSS) is unnecessary as well since the BFT algorithm provides a broadcast channel. We first present the VSS with share recovery problem, which is the subproblem of AVSS required to incorporate secret shared state into a BFT engine. Then, we provide the first VSS with share recovery solution, KZG-VSSR, in which a failure-free sharing incurs only a constant number of cryptographic operations per replica. Finally, we show how to efficiently integrate any instantiation of VSSR into a BFT replication protocol while incurring only constant overhead. Instantiating VSSR with prior AVSS protocols would require a quadratic communication cost for a single shared value and incur a linear overhead when incorporated into BFT replication. We demonstrate our end-to-end solution via a a private key-value store built using BFT replication and two instantiations of VSSR, KZG-VSSR and Ped-VSSR, and present its evaluation.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

ISBN

9781450367479

Publication Date

November 6, 2019

Start / End Page

2387 / 2402
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Basu, S., Malkhi, D., Tomescu, A., Reiter, M. K., Abraham, I., & Sirer, E. G. (2019). Efficient verifiable secret sharing with share recovery in BFT protocols. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2387–2402). https://doi.org/10.1145/3319535.3354207
Basu, S., D. Malkhi, A. Tomescu, M. K. Reiter, I. Abraham, and E. G. Sirer. “Efficient verifiable secret sharing with share recovery in BFT protocols.” In Proceedings of the ACM Conference on Computer and Communications Security, 2387–2402, 2019. https://doi.org/10.1145/3319535.3354207.
Basu S, Malkhi D, Tomescu A, Reiter MK, Abraham I, Sirer EG. Efficient verifiable secret sharing with share recovery in BFT protocols. In: Proceedings of the ACM Conference on Computer and Communications Security. 2019. p. 2387–402.
Basu, S., et al. “Efficient verifiable secret sharing with share recovery in BFT protocols.” Proceedings of the ACM Conference on Computer and Communications Security, 2019, pp. 2387–402. Scopus, doi:10.1145/3319535.3354207.
Basu S, Malkhi D, Tomescu A, Reiter MK, Abraham I, Sirer EG. Efficient verifiable secret sharing with share recovery in BFT protocols. Proceedings of the ACM Conference on Computer and Communications Security. 2019. p. 2387–2402.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

ISSN

1543-7221

ISBN

9781450367479

Publication Date

November 6, 2019

Start / End Page

2387 / 2402