Filters








3 Hits in 4.3 sec

UC Non-Interactive, Proactive, Threshold ECDSA [article]

Ran Canetti, Nikolaos Makriyannis, Udi Peled
2020 IACR Cryptology ePrint Archive  
of the art: • Signature generation takes only 4 rounds (down from the current 8 rounds), with a comparable computational cost.  ...  oracle model, assuming Strong RSA, semantic security of the Paillier encryption, and a somewhat enhanced variant of existential unforgeability of ECDSA.  ...  These properties (low latency, compatibility with cold-wallet architectures, proactive security, and composable security) make the protocol ideal for threshold wallets for ECDSA-based cryptocurrencies.  ... 
dblp:journals/iacr/CanettiMP20 fatcat:2wykhdqdhbhdrjcrtuz72fwp5y

Multi-Party Revocation in Sovrin: Performance through Distributed Trust [article]

Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
2020 IACR Cryptology ePrint Archive  
Specifically, for the q-SDH-based accumulators, we provide a maliciously-secure variant sped up by a secure multi-party computation (MPC) protocol (IMACC'19) built on top of SPDZ and a maliciously secure  ...  In this paper, we introduce multi-party public-key accumulators dubbed dynamic (threshold) secret-shared accumulators.  ...  Transport, Innovation and Technology (bmvit), the Austrian Federal Ministry for Digital and Economic Affairs (bmdw), the Austrian Research Promotion Agency (FFG), the province of Styria (SFG) and partners from  ... 
dblp:journals/iacr/HelmingerKRW20a fatcat:mn22hnielbhxrdy3k2ztmwwzfq

Practical Secure Computation for Internet Infrastructure

Kris Shrishak Sridaran
2021
Not only is MPC useful when data needs to be processed, but it is also useful when cryptographic data such as signing keys are to be kept securely.  ...  In this thesis, we make MPC practical to secure Internet infrastructure. While MPC has been applied to many applications, it has not yet been used to secure Internet infrastructure.  ...  Securing DNSSEC keys via threshold ECDSA from generic MPC. In Liqun Chen, Ninghui Li, Kaitai Liang, and Steve A.  ... 
doi:10.26083/tuprints-00018504 fatcat:or564dd4ffhb7ndhuk5w6xpetm