Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities in advanced cryptographic methods used for cryptocurrency wallet security in this 40-minute Black Hat conference talk. Delve into multi-party computation (MPC) and threshold signature schemes (TSS), understanding their implementation in major organizations for distributed, trustless secret key generation and digital signing. Discover how these seemingly powerful techniques can be fragile in practice through a detailed examination of multiple bugs. Learn about enterprise wallets, distributed trust, and various cryptographic concepts including distributed key generation, commitments, threshold secret-sharing, and zero-knowledge proofs. Analyze the attacker model, explore a taxonomy of attacks, and gain insights on the practical implications of using MPC and TSS in cryptocurrency security. Presented by Omer Shlomovits and Jean-Philippe Aumasson, this talk offers valuable lessons on minimizing complexity and critically evaluating academic papers in the context of real-world cryptographic implementations.
Syllabus
Intro
The speakers
What's a wallet?
Enterprise wallets
Distributing trust
Multi-party computation (MPC)
Threshold signatures (TSS)
Distributed key generation
Commitments
Threshold secret-sharing
Zero-knowledge proofs
Setup
Attacker Model
Our attacks
Attacks taxonomy
Lather, Rinse, Repeat
Golden Shoe
Minimize complexity
Careful with academic papers
Should I use MPC and TSS?
Taught by
Black Hat
Related Courses
Homomorphic Encryption in the SPDZ Protocol for MPCSimons Institute via YouTube Signatures, Commitments, Zero-Knowledge, and Applications
Simons Institute via YouTube Efficient Zero Knowledge Proof from Interactive Proofs
Simons Institute via YouTube Berkeley in the 80s - Episode 1- Shafi Goldwasser
Simons Institute via YouTube ITC Conference - Line Point Zero Knowledge and Its Applications
Paul G. Allen School via YouTube