[HTML][HTML] Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training

J Chen, Z Wang, G Srivastava, TA Alghamdi… - Journal of Industrial …, 2024 - Elsevier
The space-air-ground-sea three-dimensional (3D) network is a comprehensive
communication network system. This 3D network combines extensive coverage of satellite …

Threshold ECDSA in three rounds

J Doerner, Y Kondi, E Lee… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We present a three-round protocol for threshold ECDSA signing with malicious security
against a dishonest majority, which information-theoretically UC-realizes a standard …

Scalability and Security of Blockchain-empowered Metaverse: A Survey

H Huang, Z Yin, Q Yang, T Li, X Luo… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Metaverse brings unlimited space and tremendous potential since it is an integrated
application of multiple fundamental technologies such as artificial intelligence, blockchain …

Threshold structure-preserving signatures: Strong and adaptive security under standard assumptions

A Mitrokotsa, S Mukherjee, M Sedaghat… - … Conference on Public …, 2024 - Springer
Abstract Structure-preserving signatures (SPS) have emerged as an important cryptographic
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …

H2CT: Asynchronous Distributed Key Generation With High Computational Efficiency and Threshold Security in Blockchain Network

A **ang, H Gao, Y Tian, J **ong… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Asynchronous distributed key generation (ADKG) is a strong-robustness key management
technology to bootstrap threshold cryptosystems without a global clock, which can enable …

Accountable and secure threshold EdDSA signature and its applications

Y **e, Q Fan, C Zhang, T Wu, Y Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Threshold signatures as a method to realize multi-party cooperation and trust distribution in
blockchain have been widely studied in recent years. However, among these researches …

How (Not) to build threshold EdDSA

HWH Wong, JPK Ma, HHF Yin, SSM Chow - Proceedings of the 26th …, 2023 - dl.acm.org
Edwards-curve digital signature algorithm (EdDSA) is a highly efficient scheme with a short
key size. It is derived from the threshold-friendly Schnorr signatures and is covered by the …

Efficient Proofs of Possession for Legacy Signatures

APY Woo, A Ozdemir, C Sharp, T Pornin… - 2025 IEEE Symposium …, 2024 - computer.org
Digital signatures underpin identity, authenticity, and trust in modern computer systems.
Cryptography research has shown that it is possible to prove possession of a valid message …

Batch Range Proof: How to Make Threshold ECDSA More Efficient

G Tang, S Han, L Lin, C Wei, Y Yan - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
With the demand of cryptocurrencies, threshold ECDSA recently regained popularity. So far,
several methods have been proposed to construct threshold ECDSA, including the usage of …

[HTML][HTML] An efficient Proof-of-Authority consensus scheme against cloning attacks

SP Lu, CL Lei, MH Tsai - Computer Communications, 2024 - Elsevier
Abstract Proof-of-Authorization (PoA) consensus algorithms are widely used in
permissioned blockchain networks due to their high throughput, security, and efficiency …