The following pages link to (Q3149761):
Displayed 21 items.
- Certificateless threshold signature secure in the standard model (Q497178) (← links)
- Certificateless threshold signature scheme from bilinear maps (Q621600) (← links)
- FROST: Flexible round-optimized Schnorr threshold signatures (Q832324) (← links)
- Threshold schemes from isogeny assumptions (Q2055691) (← links)
- ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability (Q2104418) (← links)
- Threshold Schnorr with stateless deterministic signing from standard assumptions (Q2120070) (← links)
- MuSig2: simple two-round Schnorr multi-signatures (Q2120074) (← links)
- The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures (Q2152049) (← links)
- Fair signature exchange via delegation on ubiquitous networks (Q2256716) (← links)
- Practical (fully) distributed signatures provably secure in the standard model (Q2354772) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918439) (← links)
- Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices (Q5918662) (← links)
- Threshold and multi-signature schemes from linear hash functions (Q6083683) (← links)
- MuSig-L: lattice-based multi-signature with single-round online phase (Q6104337) (← links)
- Better than advertised security for non-interactive threshold signatures (Q6166964) (← links)
- Threshold signatures with private accountability (Q6166965) (← links)
- Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions (Q6186607) (← links)
- Fully adaptive Schnorr threshold signatures (Q6186608) (← links)
- Snowblind: a threshold blind signature in pairing-free groups (Q6186609) (← links)
- Practical Schnorr threshold signatures without the algebraic group model (Q6186611) (← links)