Fast Threshold ECDSA with Honest Majority
暂无分享,去创建一个
Ivan Damgård | Jakob Illeborg Pagter | Jesper Buus Nielsen | Thomas P. Jakobsen | Michael Bæksvang Østergård
[1] Martin Hirt,et al. Perfectly-Secure MPC with Linear Communication Complexity , 2008, TCC.
[2] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[3] Marcel Keller,et al. Securing DNSSEC Keys via Threshold ECDSA From Generic MPC , 2020, IACR Cryptol. ePrint Arch..
[4] Douglas R. Stinson,et al. Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates , 2001, ACISP.
[5] Yehuda Lindell,et al. Fast Large-Scale Honest-Majority MPC for Malicious Adversaries , 2018, Journal of Cryptology.
[6] Abhi Shelat,et al. Secure Two-party Threshold ECDSA from ECDSA Assumptions , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[7] Yehuda Lindell,et al. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority , 2017, IACR Cryptol. ePrint Arch..
[8] Yehuda Lindell,et al. A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority , 2017, IACR Cryptol. ePrint Arch..
[9] Nigel P. Smart,et al. Distributing Any Elliptic Curve Based Protocol , 2019, IMACC.
[10] Daniel R. L. Brown. Generic Groups, Collision Resistance, and ECDSA , 2002, Des. Codes Cryptogr..
[11] Yehuda Lindell,et al. Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody , 2018, CCS.
[12] Michael K. Reiter,et al. Two-party generation of DSA signatures , 2001, International Journal of Information Security.
[13] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[14] Yehuda Lindell,et al. Fast Secure Two-Party ECDSA Signing , 2017, Journal of Cryptology.
[15] Arvind Narayanan,et al. Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security , 2016, ACNS.
[16] Rosario Gennaro,et al. Fast Multiparty Threshold ECDSA with Fast Trustless Setup , 2018, CCS.
[17] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[18] Yehuda Lindell,et al. Introduction to Modern Cryptography, Second Edition , 2014 .
[19] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[20] Adam Gagol,et al. Threshold ECDSA for Decentralized Asset Custody , 2020, IACR Cryptol. ePrint Arch..
[21] Dan Boneh,et al. Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security , 2017, LATINCRYPT.
[22] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[23] Adi Shamir,et al. How to share a secret , 1979, CACM.
[24] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[25] Ran Canetti,et al. UC Non-Interactive, Proactive, Threshold ECDSA , 2020, IACR Cryptol. ePrint Arch..
[26] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[27] Abhi Shelat,et al. Threshold ECDSA from ECDSA Assumptions: The Multiparty Case , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[28] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[29] Rosario Gennaro,et al. One Round Threshold ECDSA with Identifiable Abort , 2020, IACR Cryptol. ePrint Arch..
[30] Fabien Laguillaumie,et al. Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations , 2019, IACR Cryptol. ePrint Arch..
[31] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[32] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.