A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
UC Non-Interactive, Proactive, Threshold ECDSA
[article]
2020
IACR Cryptology ePrint Archive
of the art: • Signature generation takes only 4 rounds (down from the current 8 rounds), with a comparable computational cost. ...
oracle model, assuming Strong RSA, semantic security of the Paillier encryption, and a somewhat enhanced variant of existential unforgeability of ECDSA. ...
These properties (low latency, compatibility with cold-wallet architectures, proactive security, and composable security) make the protocol ideal for threshold wallets for ECDSA-based cryptocurrencies. ...
dblp:journals/iacr/CanettiMP20
fatcat:2wykhdqdhbhdrjcrtuz72fwp5y
Multi-Party Revocation in Sovrin: Performance through Distributed Trust
[article]
2020
IACR Cryptology ePrint Archive
Specifically, for the q-SDH-based accumulators, we provide a maliciously-secure variant sped up by a secure multi-party computation (MPC) protocol (IMACC'19) built on top of SPDZ and a maliciously secure ...
In this paper, we introduce multi-party public-key accumulators dubbed dynamic (threshold) secret-shared accumulators. ...
Transport, Innovation and Technology (bmvit), the Austrian Federal Ministry for Digital and Economic Affairs (bmdw), the Austrian Research Promotion Agency (FFG), the province of Styria (SFG) and partners from ...
dblp:journals/iacr/HelmingerKRW20a
fatcat:mn22hnielbhxrdy3k2ztmwwzfq
Practical Secure Computation for Internet Infrastructure
2021
Not only is MPC useful when data needs to be processed, but it is also useful when cryptographic data such as signing keys are to be kept securely. ...
In this thesis, we make MPC practical to secure Internet infrastructure. While MPC has been applied to many applications, it has not yet been used to secure Internet infrastructure. ...
Securing DNSSEC keys via threshold ECDSA from generic MPC.
In Liqun Chen, Ninghui Li, Kaitai Liang, and Steve A. ...
doi:10.26083/tuprints-00018504
fatcat:or564dd4ffhb7ndhuk5w6xpetm