UC non-interactive, proactive, threshold ECDSA with identifiable aborts

R Canetti, R Gennaro, S Goldfeder… - Proceedings of the …, 2020 - dl.acm.org
Building on the Gennaro & Goldfeder and Lindell & Nof protocols (CCS'18), we present two
threshold ECDSA protocols, for any number of signatories and any threshold, that improve …

Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

I Damgård, C Orlandi, A Takahashi, M Tibouchi - Journal of Cryptology, 2022 - Springer
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …

Threshold ECDSA in three rounds

J Doerner, Y Kondi, E Lee… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We present a three-round protocol for threshold ECDSA signing with malicious security
against a dishonest majority, which information-theoretically UC-realizes a standard …

[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications

K Sedghighadikolaei, AA Yavuz - arxiv preprint arxiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …

One round threshold ECDSA with identifiable abort

R Gennaro, S Goldfeder - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Threshold ECDSA signatures have received much attention in recent years due to the
widespread use of ECDSA in cryptocurrencies. While various protocols now exist that admit …

Secure multiparty computation from threshold encryption based on class groups

L Braun, I Damgård, C Orlandi - Annual International Cryptology …, 2023 - Springer
We construct the first actively-secure threshold version of the cryptosystem based on class
groups from the so-called CL framework (Castagnos and Laguillaumie, 2015). We show …

ROAST: robust asynchronous schnorr threshold signatures

T Ruffing, V Ronge, E **, J Schneider-Bensch… - Proceedings of the …, 2022 - dl.acm.org
Bitcoin and other cryptocurrencies have recently introduced support for Schnorr signatures
whose cleaner algebraic structure, as compared to ECDSA, allows for simpler and more …

Threshold bbs+ signatures for distributed anonymous credential issuance

J Doerner, Y Kondi, E Lee, A Shelat… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other
words, an anonymous credential scheme with threshold issuance. We prove that due to the …

Two-round threshold signature from algebraic one-more learning with errors

T Espitau, S Katsumata, K Takemure - Annual International Cryptology …, 2024 - Springer
Threshold signatures have recently seen a renewed interest due to applications in
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …

A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs

E Tairi, P Moreno-Sanchez… - 2021 IEEE symposium on …, 2021 - ieeexplore.ieee.org
Payment channel hubs (PCHs) constitute a promising solution to the inherent scalability
problem of blockchain technologies, allowing for off-chain payments between sender and …