Robust Threshold DSS Signatures

From MaRDI portal
Publication:2876915

DOI10.1007/3-540-68339-9_31zbMath1304.94101OpenAlexW1867048327MaRDI QIDQ2876915

Stanislaw Jarecki, Hugo Krawczyk, Rosario Gennaro, Tal Rabin

Publication date: 20 August 2014

Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68339-9_31




Related Items (34)

Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing ProtocolA threshold scheme under peer-to-peer networkBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesRobust and Efficient Sharing of RSA FunctionsImplementing secure reporting of sexual misconduct -- revisiting WhoTooEfficient threshold-optimal ECDSADistributed ring signatures from general dual access structuresAdaptively secure threshold symmetric-key encryptionOptimal resilient threshold GQ signaturesA Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third PartiesCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesPromise $$\varSigma $$-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class GroupsNew results and applications for multi-secret sharing schemesProvably unforgeable threshold EdDSA with an offline participant and trustless setupBetter than advertised security for non-interactive threshold signaturesPractical Schnorr threshold signatures without the algebraic group modelLeakproof secret sharing protocols with applications to group identification schemeCertificateless threshold signature secure in the standard modelEfficient generic on-line/off-line (threshold) signatures without key exposureFast secure two-party ECDSA signingThreshold ECDSA with an offline recovery partyThreshold schemes from isogeny assumptionsBandwidth-efficient threshold EC-DSAThreshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet SecurityShared generation of pseudo-random functionsSecure distributed storage and retrievalNew efficient and secure protocols for verifiable signature sharing and other applicationsEscrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using BitcoinBandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive securityAdaptively secure distributed public-key systems.Robust threshold DSS signaturesSharing DSS by the Chinese remainder theoremBit-Slice Auction Circuit\textsf{CSI-RAShi}: distributed key generation for CSIDH






This page was built for publication: Robust Threshold DSS Signatures