Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Steven Goldfeder is active.

Publication


Featured researches published by Steven Goldfeder.


applied cryptography and network security | 2016

Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security

Rosario Gennaro; Steven Goldfeder; Arvind Narayanan

While threshold signature schemes have been presented before, there has never been an optimal threshold signature algorithm for DSA. The properties of DSA make it quite challenging to build a threshold version. In this paper, we present a threshold DSA scheme that is efficient and optimal. We also present a compelling application to use our scheme: securing Bitcoin wallets. Bitcoin thefts are on the rise, and threshold DSA is necessary to secure Bitcoin wallets. Our scheme is the first general threshold DSA scheme that does not require an honest majority and is useful for securing Bitcoin wallets.


financial cryptography | 2017

Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin

Steven Goldfeder; Joseph Bonneau; Rosario Gennaro; Arvind Narayanan

We consider the problem of buying physical goods with cryptocurrencies. There is an inherent circular dependency: should be the buyer trust the seller and pay before receiving the goods or should the seller trust the buyer and ship the goods before receiving payment? This dilemma is addressed in practice using a third party escrow service. However, we show that naive escrow protocols introduce both privacy and security issues. We formalize the escrow problem and present a suite of schemes with improved security and privacy properties. Our schemes are compatible with Bitcoin and similar blockchain-based cryptocurrencies.


privacy enhancing technologies | 2018

When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies

Steven Goldfeder; Harry A. Kalodner; Dillon Reisman; Arvind Narayanan

Abstract We show how third-party web trackers can deanonymize users of cryptocurrencies. We present two distinct but complementary attacks. On most shopping websites, third party trackers receive information about user purchases for purposes of advertising and analytics. We show that, if the user pays using a cryptocurrency, trackers typically possess enough information about the purchase to uniquely identify the transaction on the blockchain, link it to the user’s cookie, and further to the user’s real identity. Our second attack shows that if the tracker is able to link two purchases of the same user to the blockchain in this manner, it can identify the user’s cluster of addresses and transactions on the blockchain, even if the user employs blockchain anonymity techniques such as CoinJoin. The attacks are passive and hence can be retroactively applied to past purchases. We discuss several mitigations, but none are perfect.


computer and communications security | 2018

Fast Multiparty Threshold ECDSA with Fast Trustless Setup

Rosario Gennaro; Steven Goldfeder

A threshold signature scheme enables distributed signing among n players such that any subgroup of size


international conference on mobile and ubiquitous systems: networking and services | 2013

Elastic Ring Search for Ad Hoc Networks

Simon Shamoun; David Sarne; Steven Goldfeder

t+1


international cryptology conference | 2018

Threshold Cryptosystems from Threshold Fully Homomorphic Encryption

Dan Boneh; Rosario Gennaro; Steven Goldfeder; Aayush Jain; Sam Kim; Peter M. R. Rasmussen; Amit Sahai

can sign, whereas any group with t or fewer players cannot. While there exist previous threshold schemes for the ECDSA signature scheme, we are the first protocol that supports multiparty signatures for any


Journal of Cybersecurity | 2018

Determining an optimal threshold on the online reserves of a bitcoin exchange

Samvit Jain; Edward W. Felten; Steven Goldfeder

t łeq n


Archive | 2016

Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

Arvind Narayanan; Joseph Bonneau; Edward W. Felten; Andrew N. Miller; Steven Goldfeder

with an efficient dealerless key generation. Our protocol is faster than previous solutions and significantly reduces the communication complexity as well. We prove our scheme secure against malicious adversaries with a dishonest majority. We implemented our protocol, demonstrating its efficiency and suitability to be deployed in practice.


IACR Cryptology ePrint Archive | 2015

On Bitcoin as a public randomness source.

Joseph Bonneau; Jeremy Clark; Steven Goldfeder

In highly dynamic mobile ad hoc networks, new paths between nodes can become available in a short amount of time. We show how to leverage this property in order to efficiently search for paths between nodes using a technique we call elastic ring search, modeled after the popular expanding ring search. In both techniques, a node searches up to a certain number of hops, waits long enough to know if a path was found, and searches again if no path was found. In elastic ring search, the delays between search attempts are long enough for shorter paths to become available, and therefore the optimal sequence of search extents may increase and even decrease. In this paper, we provide a framework to model this network behavior, define two heuristics for optimizing elastic ring search sequences, and show that elastic ring search can incur significantly lower search costs than expanding ring search.


computer and communications security | 2017

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Melissa Chase; David Derler; Steven Goldfeder; Claudio Orlandi; Sebastian Ramacher; Christian Rechberger; Daniel Slamanig; Greg Zaverucha

We develop a general approach to adding a threshold functionality to a large class of (non-threshold) cryptographic schemes. A threshold functionality enables a secret key to be split into a number of shares, so that only a threshold of parties can use the key, without reconstructing the key. We begin by constructing a threshold fully-homomorphic encryption scheme (ThFHE) from the learning with errors (LWE) problem. We next introduce a new concept, called a universal thresholdizer, from which many threshold systems are possible. We show how to construct a universal thresholdizer from our ThFHE. A universal thresholdizer can be used to add threshold functionality to many systems, such as CCA-secure public-key encryption (PKE), signature schemes, pseudorandom functions, and others primitives. In particular, by applying this paradigm to a (non-threshold) lattice signature system, we obtain the first single-round threshold signature scheme from LWE.

Collaboration


Dive into the Steven Goldfeder's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aayush Jain

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge