Coinbase published a library of distributed cryptoalgorithms KRYPTOLOGY

Coinbase company supporting the same-named digital currency exchange platform, announced On the opening of the source texts of the cryptographic library Kryptology , offering a set of cryptographic algorithms for use in distributed systems in which encryption and confirmation of authenticity is carried out with the involvement of several participants. The code is written in the GO language and distributed under the Apache 2.0 license.

It is noted that the library code has passed security audit, and the API is designed with a loaf to simplicity and protection against random errors or incorrect use that can lead to a decrease in the resistance of the mechanisms implemented. When developing also taken into account the typical problems with which they had to face Coinbase.

Library includes:

  • Sales of Shamir secretion schemes , allowing to divide secret communication between N -thers, so that any k side (k ≤ n) can jointly restore the full message, but the data from the K-1 of the parties is not enough to obtain any information about the source message. Multiplayer authorization systems are mentioned as a practical application of the method, in which the presence of a certain number of people is needed to obtain access, and each separately cannot undergo authorization, as well as biometric authentication systems that take into account several features to provide access.
  • thresholds Implementation of the ECDSA digital signature digital signature algorithm (ELLITIC Curve Digital Signature Algorithm) – gg20 and DKLS18 , offering a closed key separation schemes for sharing digital signatures, requiring participation in the process of creating a signature of a certain minimum number of joint key owners.
  • means for distributed keys generating BLS DKG and ED25119 DKG , allowing to divide the calculations carried out to form open and closed keys, between several parties, so that the keys can be generated only when working together, no side of access to closed keys and compromising one of the sides does not threaten the entire system.
  • Implementation of the algorithms of verified cryptography Camshoup ​​
/Media reports.