Fast two-party signature for upgrading ECDSA to two-party scenario easily
From MaRDI portal
Publication:6138829
DOI10.1016/J.TCS.2023.114325MaRDI QIDQ6138829FDOQ6138829
Authors: Binbin Tu, Yu Chen, Hongrui Cui, Xianfang Wang
Publication date: 16 January 2024
Published in: Theoretical Computer Science (Search for Journal in Brave)
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Security and composition of multiparty cryptographic protocols
- Efficient RSA key generation and threshold Paillier in the two-party setting
- Title not available (Why is that?)
- Efficient secure two-party protocols. Techniques and constructions
- Highly-efficient universally-composable commitments based on the DDH assumption
- Threshold cryptosystems from threshold fully homomorphic encryption
- Improving practical UC-secure commitments based on the DDH assumption
- Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security
- Two-party ECDSA from hash proof systems and efficient instantiations
- Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
- Title not available (Why is that?)
- Fast secure two-party ECDSA signing
Cited In (1)
This page was built for publication: Fast two-party signature for upgrading ECDSA to two-party scenario easily
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6138829)