Threshold raccoon: Practical threshold signatures from standard lattice assumptions

R Del Pino, S Katsumata, M Maller… - … Conference on the …, 2024 - Springer
Threshold signatures improve both availability and security of digital signatures by splitting
the signing key into N shares handed out to different parties. Later on, any subset of at least …

Two-round threshold signature from algebraic one-more learning with errors

T Espitau, S Katsumata, K Takemure - Annual International Cryptology …, 2024 - Springer
Threshold signatures have recently seen a renewed interest due to applications in
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …

Adaptively Secure 5 Round Threshold Signatures from  and  with Rewinding

S Katsumata, M Reichle, K Takemure - Annual International Cryptology …, 2024 - Springer
T-out-of-N threshold signatures have recently seen a renewed interest, with various types
now available, each offering different tradeoffs. However, one property that has remained …

Loquat: a SNARK-friendly post-quantum signature based on the legendre PRF with applications in ring and aggregate signatures

X Zhang, R Steinfeld, MF Esgin, JK Liu, D Liu… - Annual International …, 2024 - Springer
We design and implement a novel post-quantum signature scheme based on the Legendre
PRF, named Loquat. Prior to this work, efficient approaches for constructing post-quantum …

Efficient linkable ring signatures: new framework and post-quantum instantiations

Y Xue, X Lu, MH Au, C Zhang - European Symposium on Research in …, 2024 - Springer
In this paper, we introduce a new framework for constructing linkable ring signatures (LRS).
Our framework is based purely on signatures of knowledge (SoK) which allows one to issue …

The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy

V Lyubashevsky, G Seiler, P Steuer - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
The hardness of lattice problems offers one of the most promising security foundations for
quantum-safe cryptography. Basic schemes for public key encryption and digital signatures …

Merkle tree ladder mode: reducing the size impact of NIST PQC signature algorithms in practice

A Fregly, J Harvey, BS Kaliski Jr, S Sheth - Cryptographers' Track at the …, 2023 - Springer
Abstract We introduce the Merkle Tree Ladder (MTL) mode of operation for signature
schemes. MTL mode signs messages using an underlying signature scheme in such a way …

Hash-Based Multi-Signatures for Post-Quantum Ethereum

J Drake, D Khovratovich, M Kudinov… - Cryptology ePrint …, 2025 - eprint.iacr.org
With the threat posed by quantum computers on the horizon, systems like Ethereum must
transition to cryptographic primitives resistant to quantum attacks. One of the most critical of …

Post-quantum privacy pass via post-quantum anonymous credentials

GV Policharla, B Westerbaan… - Cryptology ePrint …, 2023 - eprint.iacr.org
It is known that one can generically construct a post-quantum anonymous credential
scheme, supporting the showing of arbitrary predicates on its attributes using general …

Improving bitcoin's post-quantum transaction efficiency with a novel lattice-based aggregate signature scheme based on CRYSTALS-dilithium and a STARK protocol

Y Quan - IEEE Access, 2022 - ieeexplore.ieee.org
This paper proposes a novel lattice-based aggregate signature (LAS) scheme that brings
post-quantum security to the Bitcoin system without sacrificing its transaction efficiency …