UC non-interactive, proactive, threshold ECDSA with identifiable aborts
Building on the Gennaro & Goldfeder and Lindell & Nof protocols (CCS'18), we present two
threshold ECDSA protocols, for any number of signatories and any threshold, that improve …
threshold ECDSA protocols, for any number of signatories and any threshold, that improve …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …
Threshold ECDSA in three rounds
We present a three-round protocol for threshold ECDSA signing with malicious security
against a dishonest majority, which information-theoretically UC-realizes a standard …
against a dishonest majority, which information-theoretically UC-realizes a standard …
[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …
will play a crucial role in the security of emerging decentralized next-generation networked …
One round threshold ECDSA with identifiable abort
Threshold ECDSA signatures have received much attention in recent years due to the
widespread use of ECDSA in cryptocurrencies. While various protocols now exist that admit …
widespread use of ECDSA in cryptocurrencies. While various protocols now exist that admit …
Secure multiparty computation from threshold encryption based on class groups
We construct the first actively-secure threshold version of the cryptosystem based on class
groups from the so-called CL framework (Castagnos and Laguillaumie, 2015). We show …
groups from the so-called CL framework (Castagnos and Laguillaumie, 2015). We show …
ROAST: robust asynchronous schnorr threshold signatures
T Ruffing, V Ronge, E **, J Schneider-Bensch… - Proceedings of the …, 2022 - dl.acm.org
Bitcoin and other cryptocurrencies have recently introduced support for Schnorr signatures
whose cleaner algebraic structure, as compared to ECDSA, allows for simpler and more …
whose cleaner algebraic structure, as compared to ECDSA, allows for simpler and more …
Threshold bbs+ signatures for distributed anonymous credential issuance
We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other
words, an anonymous credential scheme with threshold issuance. We prove that due to the …
words, an anonymous credential scheme with threshold issuance. We prove that due to the …
Two-round threshold signature from algebraic one-more learning with errors
Threshold signatures have recently seen a renewed interest due to applications in
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
Payment channel hubs (PCHs) constitute a promising solution to the inherent scalability
problem of blockchain technologies, allowing for off-chain payments between sender and …
problem of blockchain technologies, allowing for off-chain payments between sender and …