Dylan Visher’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning
  • Conference Paper

May 2016

·

315 Reads

·

267 Citations

Ewa Syta

·

Iulia Tamas

·

Dylan Visher

·

[...]

·

The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts. To protect authorities and their clients proactively from undetected exploits and misuse, we introduce CoSi, a scalable witness cosigning protocol ensuring that every authoritative statement is validated and publicly logged by a diverse group of witnesses before any client will accept it. A statement S collectively signed by W witnesses assures clients that S has been seen, and not immediately found erroneous, by those W observers. Even if S is compromised in a fashion not readily detectable by the witnesses, CoSi still guarantees S's exposure to public scrutiny, forcing secrecy-minded attackers to risk that the compromise will soon be detected by one of the W witnesses. Because clients can verify collective signatures efficiently without communication, CoSi protects clients' privacy, and offers the first transparency mechanism effective against persistent man-in-the-middle attackers who control a victim's Internet access, the authority's secret key, and several witnesses' secret keys. CoSi builds on existing cryptographic multisignature methods, scaling them to support thousands of witnesses via signature aggregation over efficient communication trees. A working prototype demonstrates CoSi in the context of timestamping and logging authorities, enabling groups of over 8,000 distributed witnesses to cosign authoritative statements in under two seconds.


Figure 5: Collective signing latency versus number of participating servers  
Figure 6: Per-node, per-round computation cost versus number of participating servers  
Decentralizing Authorities into Scalable Strongest-Link Cothorities
  • Article
  • Full-text available

March 2015

·

283 Reads

·

11 Citations

Online infrastructure often depends on security-critical authorities such as logging, time, and certificate services. Authorities, however, are vulnerable to the compromise of one or a few centralized hosts yielding "weakest-link" security. We propose collective authorities or cothorities, an architecture enabling thousands of participants to witness, validate, and co-sign an authority's public actions, with moderate delays and costs. Hosts comprising a cothority form an efficient communication tree, in which each host validates log entries proposed by the root, and contributes to collective log-entry signatures. These collective signatures are small and efficient to verify, while embodying "strongest-link" trust aggregated over the collective. We present and evaluate a prototype cothority implementation supporting logging, timestamping, and public randomness (lottery) functions. We find that cothorities can scale to support over 4000 widely-distributed participants while keeping collective signing latencies to within a few seconds.

Download

Citations (2)


... These machines are interconnected using a 1Gbps switch, providing a bandwidth of 1Gbps. The overall experiment uses RSA based signature algorithms as a baseline, including CoSi [40], Boneh-Lynn-Shacham (BLS) [41]. We have confirmed through tests that the length of a signature for RSA-based methods is 2048 bits. ...

Reference:

A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning
  • Citing Conference Paper
  • May 2016

... Therefore, compared to digital signature, multi-signature has many advantages such as lower bandwidth, less storage space, and faster verification. Multi-signature has been applied in many fields, including distributed certificate authorities [5], directory authorities [6], and timestamping services [7]. ...

Decentralizing Authorities into Scalable Strongest-Link Cothorities