Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
From MaRDI portal
Publication:2822671
Recommendations
Cites work
- scientific article; zbMATH DE number 1618044 (Why is no real title available?)
- scientific article; zbMATH DE number 1722670 (Why is no real title available?)
- scientific article; zbMATH DE number 1722676 (Why is no real title available?)
- scientific article; zbMATH DE number 5009201 (Why is no real title available?)
- scientific article; zbMATH DE number 1304079 (Why is no real title available?)
- scientific article; zbMATH DE number 1088224 (Why is no real title available?)
- scientific article; zbMATH DE number 1775398 (Why is no real title available?)
- scientific article; zbMATH DE number 1418290 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A framework for practical universally composable zero-knowledge protocols
- A method for obtaining digital signatures and public-key cryptosystems
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Distributed Provers with Applications to Undeniable Signatures
- Efficient RSA key generation and threshold Paillier in the two-party setting
- How to share a secret
- Independent Zero-Knowledge Sets
- Non-interactive and reusable non-malleable commitment schemes
- Nonmalleable Cryptography
- On the Portability of Generalized Schnorr Proofs
- Practical multi-candidate election system
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Robust threshold DSS signatures
- The Knowledge Complexity of Interactive Proof Systems
Cited in
(31)- ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability
- Fast two-party signature for upgrading ECDSA to two-party scenario easily
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- Secure multi-party SM2 signature based on SPDZ protocol
- TVES: threshold verifiably encrypted signature and its applications
- Limits in the provable security of ECDSA signatures
- Promise $$\varSigma $$-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
- Simple Schnorr multi-signatures with applications to bitcoin
- One round threshold ECDSA without roll call
- Provably unforgeable threshold EdDSA with an offline participant and trustless setup
- SoK: communication across distributed ledgers
- Practical Schnorr threshold signatures without the algebraic group model
- A lower bound on the share size of leakage-resilient secret-sharing schemes
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Minimizing trust in hardware wallets with two factor signatures
- Leakage Resilient Cheating Detectable Secret Sharing Schemes
- Threshold ECDSA with an offline recovery party
- Bandwidth-efficient threshold EC-DSA
- Fast secure two-party ECDSA signing
- Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security
- Efficient threshold-optimal ECDSA
- Threshold and multi-signature schemes from linear hash functions
- Cutting the GRASS: threshold group action signature schemes
- Twinkle: threshold signatures from DDH with full adaptive security
- Better than advertised security for non-interactive threshold signatures
- Two-party adaptor signatures from identification schemes
- Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices
- Robust Distributed Pseudorandom Functions for mNP Access Structures
- Efficient two-party exponentiation from quotient transfer
- Escrow protocols for cryptocurrencies: how to buy physical goods using Bitcoin
This page was built for publication: Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2822671)