FIPS 204-Compatible Threshold ML-DSA via Shamir Nonce DKG

This paper introduces the first FIPS 204-compatible threshold ML-DSA scheme that achieves unconditional nonce share privacy and standard signature compatibility through a novel Shamir nonce DKG and pairwise-canceling PRF masks, enabling secure signing with arbitrary thresholds across various coordinator-based and fully distributed profiles.

Leo Kao

Published 2026-03-05
📖 6 min read🧠 Deep dive

Imagine you have a super-secure digital vault (like a bank account or a government seal) that requires a specific key to open. In the old world, you might give this key to a single person. But if that person gets hacked, loses the key, or decides to go rogue, the whole system is in trouble.

To fix this, we use Threshold Signatures. Instead of one key, we split the key into NN pieces (shards) and give them to NN different people. To open the vault, you don't need everyone; you just need a specific number of them (say, 3 out of 5) to come together and combine their pieces to sign a transaction.

Now, imagine the world is changing. Quantum computers are coming, and they will break our current locks. The US government (NIST) just released a new, quantum-proof lock called ML-DSA (FIPS 204).

The Problem:
While we have great ways to split keys for old locks (like ECDSA), splitting the new ML-DSA lock is incredibly hard.

  1. The "Rejection" Trap: ML-DSA works like a game of "guess the number." If the guess is slightly off, you have to start over. In a single-person scenario, this happens about 20% of the time. But if you try to split the work among 5 people using old methods, the math gets so messy that the chance of success drops to almost zero. It's like trying to get 5 people to whisper a secret to each other, but the noise is so loud that they can never agree on the answer.
  2. The Size Problem: Some previous attempts to fix this made the digital "signature" (the receipt) huge—5 times bigger than normal. This breaks compatibility with existing systems, like trying to fit a truck tire on a bicycle.

The Solution: "Shamir Nonce DKG"
This paper presents a new way to split the ML-DSA lock that solves both problems. The author, Leo Kao, uses a clever trick involving Shamir Secret Sharing (a mathematical way to split secrets) specifically for the "nonce" (the random number used in the game).

Here is the analogy:

The Analogy: The Orchestra and the Conductor

Imagine a group of musicians (the signers) trying to play a song (create a signature) for a very strict conductor (the verifier).

The Old Way (The Noise Problem):
In the old attempts, every musician had to shout their part loudly so everyone could hear it. But because they were shouting, the sound got distorted. To fix the distortion, they had to add so much "static noise" that the song became unrecognizable (huge signatures) or they just couldn't agree on the tune (failed attempts).

The New Way (The Whispering Orchestra):
This paper introduces a new method where the musicians don't shout. Instead, they use a Shamir Nonce DKG (Distributed Key Generation).

  1. The Secret Sheet Music: Before the concert, the musicians agree on a secret sheet of music (the secret key). They split this music into pieces using a special math trick (Shamir sharing).
  2. The Improvisation (The Nonce): For every song, they need to improvise a random melody (the nonce). In the past, they tried to guess this melody individually, which caused the "Rejection Trap."
    • The Innovation: Instead of guessing individually, they jointly generate the melody. Each musician writes a small part of a polynomial (a mathematical curve). When they combine their parts, they get a perfect, random melody that no single person knows, but everyone contributes to.
    • The Magic: Because they are using a specific type of curve (Shamir), even if a hacker steals the notes from 2 out of 3 musicians, they still can't figure out the melody. The remaining notes act like a "one-time pad," making the secret mathematically impossible to crack without the full group.

The "Pairwise-Canceling Masks" (The Noise Canceling Headphones)
There's one more hurdle. When the musicians send their parts to the conductor, they need to hide their individual contributions so no one can steal the melody.

  • The paper uses Pairwise-Canceling Masks. Imagine every pair of musicians has a secret "noise-canceling" code. When they send their notes, they add their own noise. But because the noise is perfectly calculated to cancel out the noise from their partner, when the conductor adds everything up, the noise disappears, and only the pure melody remains.
  • This ensures privacy without making the signature huge.

The Three "Deployment Profiles" (How to Run the Orchestra)

The paper offers three ways to run this system depending on how much trust you have:

  1. Profile P1 (The Trusted Conductor): You have a super-secure, tamper-proof computer (a TEE/HSM) acting as the conductor. It does the hard math in a sealed box.
    • Pros: Fastest (5.8ms).
    • Cons: You have to trust the hardware manufacturer.
  2. Profile P2 (The Pure Democracy): No trusted hardware. Everyone talks to everyone using complex math (MPC) to verify each other.
    • Pros: No hardware trust needed; even if most people are bad actors, the system holds.
    • Cons: Slower (21.5ms) and requires more communication.
  3. Profile P3+ (The Semi-Async Team): This is for real-world humans. The musicians prepare their parts offline (while they are drinking coffee). When the "Go" signal comes, they just send their part within a time window.
    • Pros: Very flexible; great for humans who can't be online at the exact same second.
    • Cons: Requires a bit of setup.

Why This Matters

  • It's Standard: The resulting signature is exactly the same size (3.3 KB) as a normal ML-DSA signature. Existing systems can verify it without any changes.
  • It's Fast: It works in milliseconds, comparable to a single person signing.
  • It's Secure: It doesn't rely on "hope" or complex assumptions. It uses pure math (statistics) to prove that even if a hacker steals some pieces, they learn nothing.
  • It Solves the "Scalability Gap": Previous methods broke when you tried to use more than 6 people. This works for 3, 16, or even 32 people.

In Summary:
This paper is like inventing a new way for a choir to sing a complex, quantum-proof song. Instead of everyone shouting and drowning each other out, they use a secret, coordinated whispering technique that ensures the song is perfect, the audience (verifiers) hears it clearly, and no one in the choir can steal the melody. It makes the future of secure, distributed digital signatures actually practical.