UC non-interactive, proactive, threshold ECDSA with identifiable aborts

R Canetti, R Gennaro, S Goldfeder… - Proceedings of the …, 2020‏ - dl.acm.org
Building on the Gennaro & Goldfeder and Lindell & Nof protocols (CCS'18), we present two
threshold ECDSA protocols, for any number of signatories and any threshold, that improve …

Fast secure multiparty ECDSA with practical distributed key generation and applications to cryptocurrency custody

Y Lindell, A Nof - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018‏ - dl.acm.org
ECDSA is a standardized signing algorithm that is widely used in TLS, code signing,
cryptocurrency and more. Due to its importance, the problem of securely computing ECDSA …

An algebraic framework for silent preprocessing with trustless setup and active security

D Abram, I Damgård, C Orlandi, P Scholl - Annual International Cryptology …, 2022‏ - Springer
Recently, number-theoretic assumptions including DDH, DCR and QR have been used to
build powerful tools for secure computation, in the form of homomorphic secret-sharing …

A survey of ECDSA threshold signing

JP Aumasson, A Hamelink, O Shlomovits - Cryptology ePrint Archive, 2020‏ - eprint.iacr.org
Threshold signing research progressed a lot in the last three years, especially for ECDSA,
which is less MPC-friendly than Schnorr-based signatures such as EdDSA. This progress …

Cross chain atomic swaps in the absence of time via attribute verifiable timed commitments

Y Manevich, A Akavia - 2022 IEEE 7th European Symposium …, 2022‏ - ieeexplore.ieee.org
A Hash Time Lock Contract (HTLC) is a protocol that is commonly used to exchange
payments across different blockchains. Using HTLC as a building block for cross blockchain …

PI-cut-choo and friends: Compact blind signatures via parallel instance cut-and-choose and more

R Chairattana-Apirom, L Hanzlik, J Loss… - Annual International …, 2022‏ - Springer
Blind signature schemes are one of the best-studied tools for privacy-preserving
authentication. Unfortunately, known constructions of provably secure blind signatures either …

Security analysis of RSA-BSSA

A Lysyanskaya - IACR International Conference on Public-Key …, 2023‏ - Springer
In a blind signature scheme, a user can obtain a digital signature on a message of her
choice without revealing anything about the message or the resulting signature to the signer …

Attacking threshold wallets

JP Aumasson, O Shlomovits - Cryptology ePrint Archive, 2020‏ - eprint.iacr.org
Threshold wallets leverage threshold signature schemes (TSS) to distribute signing rights
across multiple parties when issuing blockchain transactions. These provide greater …

Lngate: Powering iot with next generation lightning micro-payments using threshold cryptography

A Kurt, S Mercan, O Shlomovits, E Erdin… - Proceedings of the 14th …, 2021‏ - dl.acm.org
Bitcoin has emerged as a revolutionary payment system with its decentralized ledger
concept however it has significant problems such as high transaction fees and long …

Fast Two-party Threshold ECDSA with Proactive Security

B Koziel, SD Gordon, C Gentry - Proceedings of the 2024 on ACM …, 2024‏ - dl.acm.org
We present a new construction of two-party, threshold ECDSA, building on a 2017 scheme
of Lindell and improving his scheme in several ways. ECDSA signing is notoriously hard to …