MuSig2: Simple two-round Schnorr multi-signatures
Multi-signatures enable a group of signers to produce a joint signature on a joint message.
Recently, Drijvers et al.(S&P'19) showed that all thus far proposed two-round multi-signature …
Recently, Drijvers et al.(S&P'19) showed that all thus far proposed two-round multi-signature …
On the adaptive security of the threshold BLS signature scheme
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin,
Kursawe, and Shoup (PODC'00), schemes with unique signatures are of particular …
Kursawe, and Shoup (PODC'00), schemes with unique signatures are of particular …
MuSig-L: Lattice-based multi-signature with single-round online phase
Multi-signatures are protocols that allow a group of signers to jointly produce a single
signature on the same message. In recent years, a number of practical multi-signature …
signature on the same message. In recent years, a number of practical multi-signature …
ROAST: Robust asynchronous Schnorr threshold signatures
T Ruffing, V Ronge, E **, J Schneider-Bensch… - Proceedings of the …, 2022 - dl.acm.org
Bitcoin and other cryptocurrencies have recently introduced support for Schnorr signatures
whose cleaner algebraic structure, as compared to ECDSA, allows for simpler and more …
whose cleaner algebraic structure, as compared to ECDSA, allows for simpler and more …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …
A Comprehensive Survey of Threshold Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …
will play a crucial role in the security of emerging decentralized next-generation networked …
Threshold and multi-signature schemes from linear hash functions
This paper gives new constructions of two-round multi-signa-tures and threshold signatures
for which security relies solely on either the hardness of the (plain) discrete logarithm …
for which security relies solely on either the hardness of the (plain) discrete logarithm …
A self-sovereign identity based on zero-knowledge proof and blockchain
Systems for generating and managing digital identities are in the process of being
transformed to improve data sharing security and increase decentralization. Addressing both …
transformed to improve data sharing security and increase decentralization. Addressing both …
Two-round trip schnorr multi-signatures via delinearized witnesses
H Kılınç Alper, J Burdges - Annual International Cryptology Conference, 2021 - Springer
We construct a two-round Schnorr-based signature scheme (DWMS) by delinearizing two
pre-commitments supplied by each signer. DWMS is a secure signature scheme in the …
pre-commitments supplied by each signer. DWMS is a secure signature scheme in the …
How to prove schnorr assuming schnorr: Security of multi-and threshold signatures
This work investigates efficient multi-party signature schemes in the discrete logarithm
setting. We focus on a concurrent model, in which an arbitrary number of signing sessions …
setting. We focus on a concurrent model, in which an arbitrary number of signing sessions …