hinTS: Threshold Signatures with Silent Setup
暂无分享,去创建一个
[1] L. Baird,et al. Threshold Signatures in the Multiverse , 2023, 2023 IEEE Symposium on Security and Privacy (SP).
[2] Zhuolun Xiang,et al. Practical Asynchronous Distributed Key Generation , 2022, 2022 IEEE Symposium on Security and Privacy (SP).
[3] Silvio Micali,et al. Compact Certificates of Collective Knowledge , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[4] S. Meiklejohn,et al. Reaching Consensus for Asynchronous Distributed Key Generation , 2021, Distributed Computing.
[5] Dahlia Malkhi,et al. Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures. , 2020, CCS.
[6] Benny Pinkas,et al. Towards Scalable Threshold Cryptosystems , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[7] Matthew Green,et al. ZEXE: Enabling Decentralized Private Computation , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[8] Ittai Abraham,et al. HotStuff: BFT Consensus with Linearity and Responsiveness , 2019, PODC.
[9] Dan Boneh,et al. Compact Multi-Signatures for Smaller Blockchains , 2018, IACR Cryptol. ePrint Arch..
[10] Eike Kiltz,et al. The Algebraic Group Model and its Applications , 2018, IACR Cryptol. ePrint Arch..
[11] Martin R. Albrecht,et al. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity , 2016, ASIACRYPT.
[12] Jens Groth,et al. On the Size of Pairing-Based Non-interactive Arguments , 2016, EUROCRYPT.
[13] Nir Bitansky,et al. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again , 2012, ITCS '12.
[14] Tanja Lange,et al. High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.
[15] Ian Goldberg,et al. Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.
[16] Thomas Ristenpart,et al. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks , 2007, EUROCRYPT.
[17] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[18] Silvio Micali,et al. Accountable-subgroup multisignatures: extended abstract , 2001, CCS '01.
[19] Rasmus Pagh,et al. Cuckoo Hashing , 2001, Encyclopedia of Algorithms.
[20] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[21] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[22] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[23] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[24] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[25] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[26] Nicholas Pippenger,et al. On the Evaluation of Powers and Monomials , 1980, SIAM J. Comput..
[27] Adi Shamir,et al. How to share a secret , 1979, CACM.
[28] A. Sonnino,et al. Subset-optimized BLS Multi-signature with Key Aggregation , 2023, IACR Cryptol. ePrint Arch..
[29] René Peralta. NIST First Call for Multi-Party Threshold Schemes , 2023 .
[30] Sri Aravinda Krishnan Thyagarajan,et al. Non-interactive VSS using Class Groups and Application to DKG , 2023, IACR Cryptol. ePrint Arch..
[31] Fatemeh Shirazi,et al. Accountable Light Client Systems for PoS Blockchains , 2022, IACR Cryptol. ePrint Arch..
[32] Joseph Bonneau,et al. Powers-of-Tau to the People: Decentralizing Setup Ceremonies , 2022, IACR Cryptol. ePrint Arch..
[33] Carla Ràfols,et al. An Algebraic Framework for Universal and Updatable SNARKs , 2021, IACR Cryptol. ePrint Arch..
[34] Craig Gentry,et al. Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties , 2021, IACR Cryptol. ePrint Arch..
[35] Jens Groth,et al. Non-interactive distributed key generation and key resharing , 2021, IACR Cryptol. ePrint Arch..
[36] Mary Maller,et al. SnarkPack: Practical SNARK Aggregation , 2021, IACR Cryptol. ePrint Arch..
[37] Benedikt Bünz,et al. Proofs for Inner Pairing Products and Applications , 2021, ASIACRYPT.
[38] Ariel Gabizon,et al. PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge , 2019, IACR Cryptol. ePrint Arch..
[39] Hoeteck Wee,et al. Pixel: Multi-signatures for Consensus , 2019, IACR Cryptol. ePrint Arch..
[40] Nir Bitansky,et al. The Hunting of the SNARK , 2016, Journal of Cryptology.
[41] Dirk Fox,et al. Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.