MuSig2: Simple two-round Schnorr multi-signatures

J Nick, T Ruffing, Y Seurin - Annual International Cryptology Conference, 2021 - Springer
Multi-signatures enable a group of signers to produce a joint signature on a joint message.
Recently, Drijvers et al.(S&P'19) showed that all thus far proposed two-round multi-signature …

On the adaptive security of the threshold BLS signature scheme

R Bacho, J Loss - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin,
Kursawe, and Shoup (PODC'00), schemes with unique signatures are of particular …

MuSig-L: Lattice-based multi-signature with single-round online phase

C Boschini, A Takahashi, M Tibouchi - Annual International Cryptology …, 2022 - Springer
Multi-signatures are protocols that allow a group of signers to jointly produce a single
signature on the same message. In recent years, a number of practical multi-signature …

ROAST: Robust asynchronous Schnorr threshold signatures

T Ruffing, V Ronge, E **, J Schneider-Bensch… - Proceedings of the …, 2022 - dl.acm.org
Bitcoin and other cryptocurrencies have recently introduced support for Schnorr signatures
whose cleaner algebraic structure, as compared to ECDSA, allows for simpler and more …

Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

I Damgård, C Orlandi, A Takahashi, M Tibouchi - Journal of Cryptology, 2022 - Springer
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …

A Comprehensive Survey of Threshold Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications

K Sedghighadikolaei, AA Yavuz - arxiv preprint arxiv:2311.05514, 2023 - arxiv.org
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …

Threshold and multi-signature schemes from linear hash functions

S Tessaro, C Zhu - Annual International Conference on the Theory and …, 2023 - Springer
This paper gives new constructions of two-round multi-signa-tures and threshold signatures
for which security relies solely on either the hardness of the (plain) discrete logarithm …

A self-sovereign identity based on zero-knowledge proof and blockchain

M Dieye, P Valiorgue, JP Gelas, EH Diallo… - IEEe …, 2023 - ieeexplore.ieee.org
Systems for generating and managing digital identities are in the process of being
transformed to improve data sharing security and increase decentralization. Addressing both …

Two-round trip schnorr multi-signatures via delinearized witnesses

H Kılınç Alper, J Burdges - Annual International Cryptology Conference, 2021 - Springer
We construct a two-round Schnorr-based signature scheme (DWMS) by delinearizing two
pre-commitments supplied by each signer. DWMS is a secure signature scheme in the …

How to prove schnorr assuming schnorr: Security of multi-and threshold signatures

E Crites, C Komlo, M Maller - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This work investigates efficient multi-party signature schemes in the discrete logarithm
setting. We focus on a concurrent model, in which an arbitrary number of signing sessions …