[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications

K Sedghighadikolaei, AA Yavuz - arxiv preprint arxiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …

Arctic: Lightweight and Stateless Threshold Schnorr Signatures

C Komlo, I Goldberg - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Threshold Schnorr signatures are seeing increased adoption in practice, and offer practical
defenses against single points of failure. However, one challenge with existing randomized …

Non-Interactive Threshold BBS+ From Pseudorandom Correlations

S Faust, C Hazay, D Kretzler, L Rometsch… - Cryptology ePrint …, 2023 - eprint.iacr.org
The BBS+ signature scheme is one of the most prominent solutions for realizing anonymous
credentials. Its prominence is due to properties like selective disclosure and efficient …

TOPCOAT: towards practical two-party Crystals-Dilithium

N Snetkov, J Vakarjuk, P Laud - Discover Computing, 2024 - Springer
The development of threshold protocols based on lattice-signature schemes has been of
increasing interest in the past several years. The main research focus has been towards …

Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures

A Mehmood, MA Khan, C Maple… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The growing deployment of Industrial Internet of Things (IIoTs) raises significant
authentication concerns, especially in scenarios where resource-constrained devices need …

[PDF][PDF] Threshold BBS+ From Pseudorandom Correlations.

S Faust, C Hazay, D Kretzler, B Schlosser - IACR Cryptol. ePrint Arch., 2023 - core.ac.uk
The BBS+ signature scheme is one of the most prominent solutions for realizing anonymous
credentials. In particular, due to properties like selective disclosure and efficient protocols for …

[PDF][PDF] Nonce generation techniques in Schnorr multi-signatures: Exploring EdDSA-inspired approaches

NH Sabbry, A Levina - AIMS Mathematics, 2024 - aimspress.com
Nonce generation techniques in Schnorr multi-signatures: Exploring EdDSA-inspired approaches
Page 1 AIMS Mathematics, 9(8): 20304–20325. DOI: 10.3934/math.2024988 Received: 27 …

Provably secure multilayers certificateless proxy signature for Industrial Internet of Things

R Ullah, A Mehmood, MA Khan, I Ullah - 2024 - researchsquare.com
The emergent nature of Industrial Internet of Things (IIoTs) raises significant authentication
concerns in Certificateless Proxy Signature (CLPS) to ensure protection from modern forgery …

Improving Scalability, Privacy, and Decentralization of Blockchains and their Applications via Multiparty Computation

B Schlosser - tuprints.ulb.tu-darmstadt.de
Since the advent of Bitcoin in 2008, a myriad of blockchain systems have emerged.
Blockchains provide decentralized systems aiming to remove any trust in centralized parties …