Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
UC non-interactive, proactive, threshold ECDSA with identifiable aborts
Building on the Gennaro & Goldfeder and Lindell & Nof protocols (CCS'18), we present two
threshold ECDSA protocols, for any number of signatories and any threshold, that improve …
threshold ECDSA protocols, for any number of signatories and any threshold, that improve …
Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing,
cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA …
cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA …
An algebraic framework for silent preprocessing with trustless setup and active security
Recently, number-theoretic assumptions including DDH, DCR and QR have been used to
build powerful tools for secure computation, in the form of homomorphic secret-sharing …
build powerful tools for secure computation, in the form of homomorphic secret-sharing …
A survey of ECDSA threshold signing
Threshold signing research progressed a lot in the last three years, especially for ECDSA,
which is less MPC-friendly than Schnorr-based signatures such as EdDSA. This progress …
which is less MPC-friendly than Schnorr-based signatures such as EdDSA. This progress …
Cross chain atomic swaps in the absence of time via attribute verifiable timed commitments
A Hash Time Lock Contract (HTLC) is a protocol that is commonly used to exchange
payments across different blockchains. Using HTLC as a building block for cross blockchain …
payments across different blockchains. Using HTLC as a building block for cross blockchain …
PI-cut-choo and friends: Compact blind signatures via parallel instance cut-and-choose and more
Blind signature schemes are one of the best-studied tools for privacy-preserving
authentication. Unfortunately, known constructions of provably secure blind signatures either …
authentication. Unfortunately, known constructions of provably secure blind signatures either …
Security analysis of RSA-BSSA
In a blind signature scheme, a user can obtain a digital signature on a message of her
choice without revealing anything about the message or the resulting signature to the signer …
choice without revealing anything about the message or the resulting signature to the signer …
Attacking threshold wallets
Threshold wallets leverage threshold signature schemes (TSS) to distribute signing rights
across multiple parties when issuing blockchain transactions. These provide greater …
across multiple parties when issuing blockchain transactions. These provide greater …
Lngate: Powering iot with next generation lightning micro-payments using threshold cryptography
Bitcoin has emerged as a revolutionary payment system with its decentralized ledger
concept however it has significant problems such as high transaction fees and long …
concept however it has significant problems such as high transaction fees and long …
Fast Two-party Threshold ECDSA with Proactive Security
We present a new construction of two-party, threshold ECDSA, building on a 2017 scheme
of Lindell and improving his scheme in several ways. ECDSA signing is notoriously hard to …
of Lindell and improving his scheme in several ways. ECDSA signing is notoriously hard to …