All visitors to the NIST campus must be pre-registered. There is no onsite registration for meetings at NIST.
Join the conversation about this workshop using #NTCW2019.
All talks take place in the Green Auditorium in the Main Building (101) at the NIST campus in Gaithersburg, MD, USA
Badge pick-up (for on time and late arrivals) is done in front of the the Green auditorium — attendees need to pre-register to attend the conference.
Expected speakers are highlighted in bold.
Monday, March 11, 2019
Badge pick-up; light refreshments available.
NIST Computer Security Division welcoming
Session I.1: Threshold Schemes
Chair: Rene Peralta (NIST, USA)
Luís Brandão (NIST, USA)
Hugo Krawczyk (IBM Research, USA)
Christian Cachin (University of Bern, Switzerland), Hugo Krawczyk (IBM Research, USA), Tal Rabin (IBM Research, USA), Jason Resch (IBM, USA), Chrysoula Stathakopoulou (IBM research, Zurich, Switzerland)
Session I.2: NIST Standards
Chair: Andrew Regenscheid (NIST, USA)
Lily Chen (NIST, USA)
Dustin Moody (NIST, USA)
Session I.3: Threshold Post-Quantum
Chair: Daniel Apon (NIST, USA)
Michael Kraitsberg (Unbound Technology, Israel), Yehuda Lindell (Bar-Ilan University, Israel; Unbound Technology, Israel), Valery Osheter (Unbound Technology, Israel), Nigel P. Smart (KU Leuven, Belgium; University of Bristol, UK), Younes Talibi Alaoui (KU Leuven, Belgium)
Session I.4: Threshold Signatures
Chair: Daniel Apon (NIST, USA)
Benoît Libert (CNRS and ENS de Lyon, France), Marc Joye (OneSpan, Belgium), Moti Yung (Google Inc. and Columbia University, USA), Fabrice Mouhartem (ENS de Lyon, France)
Jack Doerner (Northeastern University, USA), Yashvanth Kondi (Northeastern University, USA), Eysa Lee (Northeastern University, USA), abhi shelat (Northeastern University, USA)
Session I.5: Panel on Threshold for DSS
Chair: Hugo Krawczyk (IBM Research, USA)
Threshold Protocols for the Digital Signature Standard
Moderator: Hugo Krawczyk (IBM Research, USA)
Session I.6: Validation
Chair: Michael Cooper (NIST, USA)
Apostol Vassilev (NIST, USA)
Session I.7: Discussion
Chair: Michael Cooper (NIST, USA)
Moderator: Nicky Mouha (NIST, USA)
Tuesday, March 12, 2019
Light refreshments available
Session II.1: Threshold Circuit Design
Chair: Meltem S. Turan (NIST, USA)
Dušan Božilov (NXP Semiconductors, Belgium; COSIC KU Leuven and imec, Belgium), Miroslav Knežević (NXP Semiconductors, Belgium), Ventzislav Nikov (NXP Semiconductors, Belgium)
Marco Macchetti (Kudelski Group, Switzerland), Karine Villegas (Kudelski Group, Switzerland), Claudio Favi (Kudelski Group, Switzerland)
Lauren De Meyer (KU Leuven, Belgium)
Victor Arribas (KU Leuven, imec-COSIC, Belgium), Svetla Nikova (KU Leuven, imec-COSIC, Belgium), Vincent Rijmen (KU Leuven, imec-COSIC, Belgium)
Session II.2: Panel on TIS
Chair: Svetla Nikova and Vincent Rijmen (KU Leuven, Belgium)
Theory of Implementation Security Panel
Session II.3: Other Threshold Primitives
Chair: John Kelsey (NIST, USA)
Peihan Miao (UC Berkeley, USA), Akshayaram Srinivasan (UC Berkeley, USA), Prashant Nalini Vasudevan (UC Berkeley, USA)
Shashank Agrawal (Visa Research, USA), Payman Mohassel (Visa Research, USA), Pratyay Mukherjee (Visa Research, USA), Peter Rindal (Visa Research, USA)
Session II.4: Threshold Cryptography Applications and Experience
Chair: Michael Davidson (NIST, USA)
Andrew Poelstra (Blockstream, USA)
Maximiliaan van de Poll (Cybernetica AS, Estonia), Aivo Kalu (Cybernetica AS, Estonia)
Jakob Pagter (Sepior, Denmark)
Daniel Shumow (Microsoft Research, USA)
Moderator: Luís Brandão (NIST, USA)
Speaker: Hugo Krawczyk (IBM Research, USA)
Title: Threshold Cryptography: Ready for Prime Time?
Abstract: The trend in trust decentralization together with the ever increasing value of digital assets (cryptocurrencies, blockchains, mega data repositories, key (mis)management, intellectual property, privacy, etc.) and the need to protect these assets for secrecy and availability, make threshold cryptography a most relevant technology whose time has come. We need to see more targeted applications as well as software platforms on which to build solutions that take into account real-world considerations such as asynchronous networks, support for diversified architectures, hardware enclaves, and more. Additionally, we need to refresh the set of techniques supporting threshold cryptography with advances in areas such as multi-party computation, quantum-resistant primitives, and blockchain-inspired consensus protocols. In addition to arguing these points, the talk will discuss some recent applications of threshold cryptography in the domain of key and password management, blockchain, and how threshold cryptography can be relevant to the #metoo movement.
Bio: Hugo Krawczyk is an IBM Fellow and Distinguished Research Staff Member with the Cryptography Group at the IBM T.J. Watson Research Center whose interests span theoretical and applied aspects of cryptography. He has contributed to the cryptographic design of numerous Internet standards, particularly IPsec, IKE, and SSL/TLS, and is a co-inventor of the HMAC message authentication algorithm. His most recent work in this area includes designs for TLS 1.3, the next generation TLS, and HKDF, the emerging standard for key derivation adopted by TLS 1.3, Signal, WhatsApp, Facebook Messenger and more. He has contributed to multiple areas of cryptography including to the theory and practice of key exchange, threshold and proactive cryptosystems, password authentication, and search on encrypted data. He is a Fellow of the International Association of Cryptologic Research (IACR) and the recipient of the 2015 RSA Conference Award for Excellence in the Field of Mathematics, the 2018 Levchin Prize for Contributions to Real-World Cryptography, and of multiple IBM awards, including two corporate awards.
Keynote 2 (Tuesday, March 12)
Speaker: Andrew Poelstra (Blockstream, USA)
Title: Challenges for Multisignature and Threshold Signature Implementation in a Bitcoin Context
Abstract: Bitcoin, started in 2009, is a digital currency in which all activity is publicly verifiable. Coins are controlled by spending policies expressed in Bitcoin Script, a simple stack-based programming language which supports hash preimage challenges and digital signatures. Included in Bitcoin Script is a basic form of threshold ECDSA signature: a list of public keys and a threshold is specified; the coins can then be moved if threshold-many valid ECDSA signatures are provided in sequence.
This threshold scheme is inefficient in terms of both signature size and verification time (both linear in the threshold size), which are the two most important considerations for cryptosystems designed for inclusion on blockchains. Being explicitly specified, they also represent a fungibility loss as threshold-controlled coins are visibly distinct from non-threshold-controlled coins. However, they achieve several practical goals which have proved difficult to preserve in more efficient threshold schemes: they are noninteractive; they require no persistent state during signing; they work in the plain public-key model and require no interactive key setup; their security follows immediately from the security of the underlying ECDSA scheme even when signing counterparties are considered to be adversarial.
In this talk we describe our work in developing a multisignature scheme for Bitcoin, called MuSig, which supports an extension to threshold signatures, over the last several years. We describe how consideration of both practical use cases and formal security models guided the evolution of our goals, and the unexpected tradeoffs that we found ourselves forced to make.
Bio: Andrew Poelstra is a Mathematician at Blockstream. He has dabbled in software development for the last twenty years, in open-source cryptography for ten. He became involved in Bitcoin in late 2011, and joined Blockstream cofounders Greg Maxwell and Pieter Wuille in developing the high-performance cryptography library libsecp256k1. His latest major project has been Mimble Wimble which is described as a blockchain design with no script support and blinded amounts. Like proverbial black holes, transaction outputs have no hair. This simplicity allows aggressive compaction and aggregation, resulting in a blockchain with much better scalability than any other design to date. He has a Bachelor of Science in Mathematics from Simon Fraser University. While completing his Masters of Arts at the University of Texas at Austin, he wrote and co-wrote several papers about Bitcoin, practical cryptography and mathematics.
- Threshold Protocols for the Digital Signature Standard. Organizer: Rosario Gennaro. Panelists: Rosario Gennaro1, abhi shelat2, Samuel Ranellucci3, Hugo Krawczyk4 (moderator). (1 CUNY, USA; 2 Northeastern University, USA; 3 Unbound Tech, Israel; 4 IBM Research, USA)
- Theory of Implementation Security Panel. Organizers: Organizers: Svetla Nikova1, Vincent Rijmen1. Panelists: Nigel Smart1, Ventzislav Nikov2, Mike Hutter3, Junfeng Fan4, Ruggero Susella5, Emmanuel Prouff6. (1 KU Leuven, Belgium; 2 NXP Semiconductors; 3 Rambus, USA; 4 Open Security Research; 5 ST Microelectronics; 6 ANSSI, France)
- Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. Michael Kraitsberg3, Yehuda Lindell1,3, Valery Osheter3, Nigel P. Smart2,4, Younes Talibi Alaoui2. (1 Bar-Ilan University, Israel; 2 KU Leuven, Belgium; 3 Unbound Technology, Israel; 4 University of Bristol, UK)
- Fully Distributed Non-Interactive Adaptively-Secure Threshold Signature Scheme with Short Shares: Efficiency Considerations and Implementation. Benoît Libert1,2, Marc Joye3, Moti Yung4, Fabrice Mouhartem2. (1 CNRS, France; 2 ENS de Lyon, France; 3 OneSpan, Belgium; 4 Google Inc. and Columbia University, USA)
- A Multiparty Computation Approach to Threshold ECDSA. Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat. (Northeastern University, USA)
- Efficient Leakage Resilient Secret Sharing. Peihan Miao, Akshayaram Srinivasan, Prashant Nalini Vasudevan. (UC Berkeley, USA)
- DiSE: Distributed Symmetric-key Encryption. Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal. (Visa Research, USA)
- Platform for Robust Threshold Cryptography. Christian Cachin1, Hugo Krawczyk2, Tal Rabin2, Jason Resch3, Chrysoula Stathakopoulou4. (1 University of Bern, Switzerland; 2 IBM Research, USA; 3 IBM, USA; 4 IBM research, Zurich, Switzerland)
- Optimized Threshold Implementations: Number of Shares and Area/Latency Trade-off. Dušan Božilov1,2, Miroslav Knežević1, Ventzislav Nikov1. (1 NXP Semiconductors, Belgium; 2 COSIC KU Leuven and imec, Belgium)
- The pitfalls of threshold cryptography in hardware. Marco Macchetti, Karine Villegas, Claudio Favi. (Kudelski Group, Switzerland)
- Threshold Cryptography against Combined Physical Attacks. Lauren De Meyer (KU Leuven, Belgium)
- VerMI: Verification Tool for Masked Implementations. Victor Arribas, Svetla Nikova, Vincent Rijmen. (KU Leuven, imec-COSIC, Belgium)
- SplitKey Case Study. Maximiliaan van de Poll, Aivo Kalu. (Cybernetica AS, Estonia)
- Practical Threshold Cryptography for Cloud and Cryptocurrencies. Jakob Pagter. (Sepior, Denmark)
- Practice Based Recommendations for Standardization of Threshold Cryptography. Daniel Shumow. (Microsoft Research, USA)
- NIST Computer Security Division welcoming. Matthew Scholl
- Enter the Threshold (The NIST Threshold Cryptography Workshop). Luís Brandão
- The NIST Standardization Approach on Cryptography ─ Past, Present, and Future. Lily Chen
- NIST Status Update on Elliptic Curves and Post-Quantum Crypto. Dustin Moody
- Quo Vadis, Crypto Validation? Apostol Vassilev
- Open discussion. Nicky Mouha
Organization (NIST Computer Security Division)
- Co-chairs and program committee: Luís Brandão, Nicky Mouha, Apostol Vassilev
- Administrative organization: Sara Kermans, Pauline Truong, Mary Lou Norris
- (Non-panel) Session Chairs: Rene Peralta, Andrew Regenscheid, Daniel Apon, Michael Cooper, Meltem Sönmez Turan, John Kelsey, Michael Davidson
Call for submissions
NIST is interested in promoting the security of implementations of cryptographic primitives. This security depends not only on the theoretical properties of the primitives but also on the ability to withstand attacks on their implementations. It is thus important to mitigate breakdowns that result from differences between ideal and real implementations of cryptographic algorithms.
Threshold schemes for cryptographic primitives have the potential to strengthen the secrecy of cryptographic keys, as well as to enhance integrity and availability of the implemented primitives, including providing resistance against side-channel and fault attacks.
NIST seeks to discuss aspects of threshold cryptography (used as an umbrella term) in a wide range of application environments and the potential future standardization of threshold schemes for cryptographic primitives. Therefore, NIST is soliciting papers, presentations, panel proposals, and participation from any interested parties. NIST will post the accepted papers and presentations on the workshop website; however, no formal workshop proceedings will be published.
Topics include, but are not limited to:
Security criteria, resource requirements and characteristics of real-world applications of threshold cryptographic systems
Threshold techniques, including techniques related to secure multi-party computation and intrusion-tolerant distributed systems, both in hardware and software
Case studies of deployed threshold systems
Evaluation of security, reliability, threats and attacks in threshold cryptography
Design, analysis and implementation of threshold schemes for cryptographic primitives
Challenges in testing and validation of threshold cryptographic systems
Benchmarking of threshold schemes in hardware and software
Countermeasures against side-channel and fault attacks using threshold approaches
Threshold cryptography for blockchain, cloud computing, hardware security modules (HSMs), and the Internet of Things (IoT)
Submission deadline: December 17, 2018
Notification deadline: (Tentative) February 08, 2019 (previous January 15 deadline was postponed due to Government Shutdown)
February 18, 2019 Extended to March 04, 2019 and is now closed.
Workshop: March 11-12, 2019
How to submit
Submissions must be provided electronically in PDF format. Paper submissions should not exceed 15 pages. Proposals for presentations or panels should be no longer than 5 pages; panel proposals should identify possible panelists and an indication of which panelists have confirmed their participation.
Please submit to email@example.com:
- Contact details of the authors
The paper, presentation or panel proposal in PDF format as an attachment.
Click here for a PDF of this call for submissions.