AMIS open sources Hierarchical Threshold Signature Scheme library (Alice)

AMIS is a financial technology company creating bonds between traditional and decentralized worlds. For a traditional financial company, it’s vital to avoid single points of failure and establish accountability.

Image for post

Comparing to Threshold Signature Scheme (TSS), shares in this Hierarchical Threshold Signature Scheme (HTSS) are allowed to have different ranks. The main merit of this scheme is vertical access control such that it has “partial accountability”. Although TSS achieves joint control to disperse risk among the participants and avoid single points of failure, the level of all shares are equal. It is impossible to distinguish which share getting involved in an unexpected signature. It is because TSS only supports horizontal access control.

For example, an important contract not only requires enough signatures, but also needs to be signed by a manager. In HTSS framework, through assigning different ranks of each share induces that any valid signature generated includes the share of the manager.

Therefore, AMIS developed a HTSS library and called it, Alice.

Security

For a crypto library, security is always our first priority for AMIS. To improve Alice, we decide to open source and invite Kudelski Security, which is a leading 3rd party auditor cybersecurity industry, to audit the source code of Alice. The full audit report can be downloaded here.

In the audit report, Kudelski Security points out Alice’s uniqueness compared to other TSS libraries:

Compared to other threshold signature scheme solutions, different levels of authorization are possible in Alice, where holders of the secret shares can have different “weights” in respect to the ability to generate a valid signature.

No high severity security issues are found in the audit report, but there’re some medium and low severity security issues. With Kudelski Security’s great help, we’ve fixed most of them and the audit history can be found in this branch and in the report.

Before using Alice

Please read the document carefully before you use it into your production. The most things are:

  • Use end-to-end encryption to transfer messages between two parties.
  • Stop and restart it if any error messages occur during execution Alice.

Conclusion

Thanks for Kudelski Security’s auditing, Alice becomes safer and more robust. AMIS will keep working on Alice to develop more Hierarchical Threshold Signature features. If you have any ideas or questions, please contact us. We’re glad to hear from you.

 

Digital Asset Custody | AMIS Technology

AMIS provides secure digital asset custodial wallet service. Our advanced encryption technology as well as hierarchical…

 

getamis/alice

This is Hierarchical Threshold Signature Scheme (HTSS) worked by AMIS. Comparing to Threshold Signature Scheme (TSS)…

github.com

 

Related Articles

Introduction to Hierarchical Threshold Signature(revised version)

Digital Signature:

medium.com

 

A Hierarchical Threshold Signature

Introduction:

medium.com

 

Hierarchical Threshold Signature demonstration

An explanation of the example in AMIS’ s HTSS library implementation, Alice.

medium.com

 

Thanks to ChihYun Chuang. 

本文由 AMIS Zih-Ci Lin 提供

原文連結

 
分享在 facebook
Facebook
分享在 google
Google+
分享在 twitter
Twitter
分享在 linkedin
LinkedIn
分享在 pinterest
Pinterest

發佈留言

發佈留言必須填寫的電子郵件地址不會公開。 必填欄位標示為 *

這個網站採用 Akismet 服務減少垃圾留言。進一步瞭解 Akismet 如何處理網站訪客的留言資料

%d 位部落客按了讚: