Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets

Black Hat via YouTube

Overview

Explore the vulnerabilities in advanced cryptographic methods used for cryptocurrency wallet security in this 40-minute Black Hat conference talk. Delve into multi-party computation (MPC) and threshold signature schemes (TSS), understanding their implementation in major organizations for distributed, trustless secret key generation and digital signing. Discover how these seemingly powerful techniques can be fragile in practice through a detailed examination of multiple bugs. Learn about enterprise wallets, distributed trust, and various cryptographic concepts including distributed key generation, commitments, threshold secret-sharing, and zero-knowledge proofs. Analyze the attacker model, explore a taxonomy of attacks, and gain insights on the practical implications of using MPC and TSS in cryptocurrency security. Presented by Omer Shlomovits and Jean-Philippe Aumasson, this talk offers valuable lessons on minimizing complexity and critically evaluating academic papers in the context of real-world cryptographic implementations.

Syllabus

Intro
The speakers
What's a wallet?
Enterprise wallets
Distributing trust
Multi-party computation (MPC)
Threshold signatures (TSS)
Distributed key generation
Commitments
Threshold secret-sharing
Zero-knowledge proofs
Setup
Attacker Model
Our attacks
Attacks taxonomy
Lather, Rinse, Repeat
Golden Shoe
Minimize complexity
Careful with academic papers
Should I use MPC and TSS?

Taught by

Black Hat

Reviews

Start your review of Multiple Bugs in Multi-Party Computation - Breaking Cryptocurrency's Strongest Wallets

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.