Fast two-party signature for upgrading ECDSA to two-party scenario easily
From MaRDI portal
Publication:6138829
DOI10.1016/j.tcs.2023.114325MaRDI QIDQ6138829
Xianfang Wang, Yu Chen, Binbin Tu, Hongrui Cui
Publication date: 16 January 2024
Published in: Theoretical Computer Science (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Efficient secure two-party protocols. Techniques and constructions
- Threshold cryptosystems from threshold fully homomorphic encryption
- Security and composition of multiparty cryptographic protocols
- Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security
- Two-party ECDSA from hash proof systems and efficient instantiations
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
- Improving Practical UC-Secure Commitments Based on the DDH Assumption
- Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
- Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A method for obtaining digital signatures and public-key cryptosystems
- Fast secure two-party ECDSA signing
This page was built for publication: Fast two-party signature for upgrading ECDSA to two-party scenario easily