An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs

Large language models (LLMs) have brought significant advancements to artificial intelligence, particularly in understanding and generating human language. However, concerns over management burden and data security have grown alongside their capabilities. To solve the problem, we design a blockchain...

Full description

Saved in:
Bibliographic Details
Main Authors: Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:IET Information Security
Online Access:http://dx.doi.org/10.1049/2024/2252865
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1825199955491422208
author Jing Wang
Xue Yuan
Yingjie Xu
Yudi Zhang
author_facet Jing Wang
Xue Yuan
Yingjie Xu
Yudi Zhang
author_sort Jing Wang
collection DOAJ
description Large language models (LLMs) have brought significant advancements to artificial intelligence, particularly in understanding and generating human language. However, concerns over management burden and data security have grown alongside their capabilities. To solve the problem, we design a blockchain-based distributed LLM framework, where LLM works in the distributed mode and its outputs can be stored and verified on a blockchain to ensure integrity, transparency, and traceability. In addition, a multiparty signature-based authentication mechanism is necessary to ensure stakeholder consensus before publication. To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.
format Article
id doaj-art-6c722e80eebd44308a600e77dbbe59a7
institution Kabale University
issn 1751-8717
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-6c722e80eebd44308a600e77dbbe59a72025-02-08T00:00:08ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/2252865An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMsJing Wang0Xue Yuan1Yingjie Xu2Yudi Zhang3School of Cyber Science and EngineeringSchool of Cyber Science and EngineeringSchool of Cyber Science and EngineeringSchool of Computing and Information TechnologyLarge language models (LLMs) have brought significant advancements to artificial intelligence, particularly in understanding and generating human language. However, concerns over management burden and data security have grown alongside their capabilities. To solve the problem, we design a blockchain-based distributed LLM framework, where LLM works in the distributed mode and its outputs can be stored and verified on a blockchain to ensure integrity, transparency, and traceability. In addition, a multiparty signature-based authentication mechanism is necessary to ensure stakeholder consensus before publication. To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.http://dx.doi.org/10.1049/2024/2252865
spellingShingle Jing Wang
Xue Yuan
Yingjie Xu
Yudi Zhang
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
IET Information Security
title An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
title_full An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
title_fullStr An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
title_full_unstemmed An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
title_short An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
title_sort efficient multiparty threshold ecdsa protocol against malicious adversaries for blockchain based llms
url http://dx.doi.org/10.1049/2024/2252865
work_keys_str_mv AT jingwang anefficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms
AT xueyuan anefficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms
AT yingjiexu anefficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms
AT yudizhang anefficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms
AT jingwang efficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms
AT xueyuan efficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms
AT yingjiexu efficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms
AT yudizhang efficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms