Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities in advanced cryptographic methods used for cryptocurrency wallet security in this 40-minute Black Hat conference talk. Delve into multi-party computation (MPC) and threshold signature schemes (TSS), understanding their implementation in major organizations for distributed, trustless secret key generation and digital signing. Discover how these seemingly powerful techniques can be fragile in practice through a detailed examination of multiple bugs. Learn about enterprise wallets, distributed trust, and various cryptographic concepts including distributed key generation, commitments, threshold secret-sharing, and zero-knowledge proofs. Analyze the attacker model, explore a taxonomy of attacks, and gain insights on the practical implications of using MPC and TSS in cryptocurrency security. Presented by Omer Shlomovits and Jean-Philippe Aumasson, this talk offers valuable lessons on minimizing complexity and critically evaluating academic papers in the context of real-world cryptographic implementations.
Syllabus
Intro
The speakers
What's a wallet?
Enterprise wallets
Distributing trust
Multi-party computation (MPC)
Threshold signatures (TSS)
Distributed key generation
Commitments
Threshold secret-sharing
Zero-knowledge proofs
Setup
Attacker Model
Our attacks
Attacks taxonomy
Lather, Rinse, Repeat
Golden Shoe
Minimize complexity
Careful with academic papers
Should I use MPC and TSS?
Taught by
Black Hat
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera