Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security

From MaRDI portal
Publication:2822671

DOI10.1007/978-3-319-39555-5_9zbMath1346.94143OpenAlexW2468121714WikidataQ111687903 ScholiaQ111687903MaRDI QIDQ2822671

Steven Goldfeder, Rosario Gennaro, Arvind Narayanan

Publication date: 4 October 2016

Published in: Applied Cryptography and Network Security (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-39555-5_9




Related Items (21)

Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing ProtocolSoK: communication across distributed ledgersEfficient threshold-optimal ECDSAPromise $$\varSigma $$-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class GroupsOne round threshold ECDSA without roll callThreshold and multi-signature schemes from linear hash functionsProvably unforgeable threshold EdDSA with an offline participant and trustless setupFast two-party signature for upgrading ECDSA to two-party scenario easilyBetter than advertised security for non-interactive threshold signaturesPractical Schnorr threshold signatures without the algebraic group modelFast secure two-party ECDSA signingTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesThreshold ECDSA with an offline recovery partyBandwidth-efficient threshold EC-DSATwo-party adaptor signatures from identification schemesSimple Schnorr multi-signatures with applications to bitcoinEscrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using BitcoinEfficient two-party exponentiation from quotient transferBandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive securityATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability




Cites Work




This page was built for publication: Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security