[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications
K Sedghighadikolaei, AA Yavuz - arxiv preprint arxiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …
will play a crucial role in the security of emerging decentralized next-generation networked …
Arctic: Lightweight and Stateless Threshold Schnorr Signatures
C Komlo, I Goldberg - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Threshold Schnorr signatures are seeing increased adoption in practice, and offer practical
defenses against single points of failure. However, one challenge with existing randomized …
defenses against single points of failure. However, one challenge with existing randomized …
Non-Interactive Threshold BBS+ From Pseudorandom Correlations
The BBS+ signature scheme is one of the most prominent solutions for realizing anonymous
credentials. Its prominence is due to properties like selective disclosure and efficient …
credentials. Its prominence is due to properties like selective disclosure and efficient …
TOPCOAT: towards practical two-party Crystals-Dilithium
The development of threshold protocols based on lattice-signature schemes has been of
increasing interest in the past several years. The main research focus has been towards …
increasing interest in the past several years. The main research focus has been towards …
Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures
The growing deployment of Industrial Internet of Things (IIoTs) raises significant
authentication concerns, especially in scenarios where resource-constrained devices need …
authentication concerns, especially in scenarios where resource-constrained devices need …
[PDF][PDF] Threshold BBS+ From Pseudorandom Correlations.
The BBS+ signature scheme is one of the most prominent solutions for realizing anonymous
credentials. In particular, due to properties like selective disclosure and efficient protocols for …
credentials. In particular, due to properties like selective disclosure and efficient protocols for …
[PDF][PDF] Nonce generation techniques in Schnorr multi-signatures: Exploring EdDSA-inspired approaches
NH Sabbry, A Levina - AIMS Mathematics, 2024 - aimspress.com
Nonce generation techniques in Schnorr multi-signatures: Exploring EdDSA-inspired approaches
Page 1 AIMS Mathematics, 9(8): 20304–20325. DOI: 10.3934/math.2024988 Received: 27 …
Page 1 AIMS Mathematics, 9(8): 20304–20325. DOI: 10.3934/math.2024988 Received: 27 …
Provably secure multilayers certificateless proxy signature for Industrial Internet of Things
The emergent nature of Industrial Internet of Things (IIoTs) raises significant authentication
concerns in Certificateless Proxy Signature (CLPS) to ensure protection from modern forgery …
concerns in Certificateless Proxy Signature (CLPS) to ensure protection from modern forgery …
Improving Scalability, Privacy, and Decentralization of Blockchains and their Applications via Multiparty Computation
B Schlosser - tuprints.ulb.tu-darmstadt.de
Since the advent of Bitcoin in 2008, a myriad of blockchain systems have emerged.
Blockchains provide decentralized systems aiming to remove any trust in centralized parties …
Blockchains provide decentralized systems aiming to remove any trust in centralized parties …