Robust Threshold DSS Signatures
From MaRDI portal
Publication:2876915
DOI10.1007/3-540-68339-9_31zbMath1304.94101OpenAlexW1867048327MaRDI QIDQ2876915
Stanislaw Jarecki, Hugo Krawczyk, Rosario Gennaro, Tal Rabin
Publication date: 20 August 2014
Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-68339-9_31
Related Items (34)
Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol ⋮ A threshold scheme under peer-to-peer network ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Robust and Efficient Sharing of RSA Functions ⋮ Implementing secure reporting of sexual misconduct -- revisiting WhoToo ⋮ Efficient threshold-optimal ECDSA ⋮ Distributed ring signatures from general dual access structures ⋮ Adaptively secure threshold symmetric-key encryption ⋮ Optimal resilient threshold GQ signatures ⋮ A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties ⋮ Compressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures ⋮ Promise $$\varSigma $$-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups ⋮ New results and applications for multi-secret sharing schemes ⋮ Provably unforgeable threshold EdDSA with an offline participant and trustless setup ⋮ Better than advertised security for non-interactive threshold signatures ⋮ Practical Schnorr threshold signatures without the algebraic group model ⋮ Leakproof secret sharing protocols with applications to group identification scheme ⋮ Certificateless threshold signature secure in the standard model ⋮ Efficient generic on-line/off-line (threshold) signatures without key exposure ⋮ Fast secure two-party ECDSA signing ⋮ Threshold ECDSA with an offline recovery party ⋮ Threshold schemes from isogeny assumptions ⋮ Bandwidth-efficient threshold EC-DSA ⋮ Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security ⋮ Shared generation of pseudo-random functions ⋮ Secure distributed storage and retrieval ⋮ New efficient and secure protocols for verifiable signature sharing and other applications ⋮ Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin ⋮ Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security ⋮ Adaptively secure distributed public-key systems. ⋮ Robust threshold DSS signatures ⋮ Sharing DSS by the Chinese remainder theorem ⋮ Bit-Slice Auction Circuit ⋮ \textsf{CSI-RAShi}: distributed key generation for CSIDH
This page was built for publication: Robust Threshold DSS Signatures