An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Large language models (LLMs) have brought significant advancements to artificial intelligence, particularly in understanding and generating human language. However, concerns over management burden and data security have grown alongside their capabilities. To solve the problem, we design a blockchain...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-01-01
|
Series: | IET Information Security |
Online Access: | http://dx.doi.org/10.1049/2024/2252865 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1825199955491422208 |
---|---|
author | Jing Wang Xue Yuan Yingjie Xu Yudi Zhang |
author_facet | Jing Wang Xue Yuan Yingjie Xu Yudi Zhang |
author_sort | Jing Wang |
collection | DOAJ |
description | Large language models (LLMs) have brought significant advancements to artificial intelligence, particularly in understanding and generating human language. However, concerns over management burden and data security have grown alongside their capabilities. To solve the problem, we design a blockchain-based distributed LLM framework, where LLM works in the distributed mode and its outputs can be stored and verified on a blockchain to ensure integrity, transparency, and traceability. In addition, a multiparty signature-based authentication mechanism is necessary to ensure stakeholder consensus before publication. To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries. |
format | Article |
id | doaj-art-6c722e80eebd44308a600e77dbbe59a7 |
institution | Kabale University |
issn | 1751-8717 |
language | English |
publishDate | 2024-01-01 |
publisher | Wiley |
record_format | Article |
series | IET Information Security |
spelling | doaj-art-6c722e80eebd44308a600e77dbbe59a72025-02-08T00:00:08ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/2252865An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMsJing Wang0Xue Yuan1Yingjie Xu2Yudi Zhang3School of Cyber Science and EngineeringSchool of Cyber Science and EngineeringSchool of Cyber Science and EngineeringSchool of Computing and Information TechnologyLarge language models (LLMs) have brought significant advancements to artificial intelligence, particularly in understanding and generating human language. However, concerns over management burden and data security have grown alongside their capabilities. To solve the problem, we design a blockchain-based distributed LLM framework, where LLM works in the distributed mode and its outputs can be stored and verified on a blockchain to ensure integrity, transparency, and traceability. In addition, a multiparty signature-based authentication mechanism is necessary to ensure stakeholder consensus before publication. To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. When compared with some related schemes, this optimization speeds up both the key generation and signing phases with constant rounds while maintaining security against malicious adversaries.http://dx.doi.org/10.1049/2024/2252865 |
spellingShingle | Jing Wang Xue Yuan Yingjie Xu Yudi Zhang An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs IET Information Security |
title | An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs |
title_full | An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs |
title_fullStr | An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs |
title_full_unstemmed | An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs |
title_short | An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs |
title_sort | efficient multiparty threshold ecdsa protocol against malicious adversaries for blockchain based llms |
url | http://dx.doi.org/10.1049/2024/2252865 |
work_keys_str_mv | AT jingwang anefficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms AT xueyuan anefficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms AT yingjiexu anefficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms AT yudizhang anefficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms AT jingwang efficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms AT xueyuan efficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms AT yingjiexu efficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms AT yudizhang efficientmultipartythresholdecdsaprotocolagainstmaliciousadversariesforblockchainbasedllms |