Zobrazeno 1 - 10
of 222
pro vyhledávání: '"Ivan Damgård"'
Autor:
Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergaard
Publikováno v:
Journal of Computer Security. 30:167-196
ECDSA is a widely adopted digital signature standard. A number of threshold protocols for ECDSA have been developed that let a set of parties jointly generate the secret signing key and compute signatures, without ever revealing the signing key. Thre
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306167
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a9f3d5962a579ed8906a8cd8d18c3dae
https://doi.org/10.1007/978-3-031-30617-4_5
https://doi.org/10.1007/978-3-031-30617-4_5
Publikováno v:
Damgård, I B, Orlandi, C, Takahashi, A & Tibouchi, M 2022, ' Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices ', Journal of Cryptology, vol. 35, no. 2, 14 . https://doi.org/10.1007/s00145-022-09425-3
Although they have been studied for a long time, distributed signature protocols have garnered renewed interest in recent years in view of novel applications to topics like blockchains. Most recent works have focused on distributed versions of ECDSA
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2311903583bf973bd5921f7cf18918c2
https://pure.au.dk/portal/da/publications/tworound-noutofn-and-multisignatures-and-trapdoor-commitment-from-lattices(4769fec4-cf5f-4dcd-b58a-c80723369909).html
https://pure.au.dk/portal/da/publications/tworound-noutofn-and-multisignatures-and-trapdoor-commitment-from-lattices(4769fec4-cf5f-4dcd-b58a-c80723369909).html
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031147906
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::567adb0dc34e8d9f473533dd959f0893
https://doi.org/10.1007/978-3-031-14791-3_10
https://doi.org/10.1007/978-3-031-14791-3_10
Publikováno v:
Advances in Cryptology – CRYPTO 2022 ISBN: 9783031159848
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5842aa07eb671e0311cd6e6097fef3e7
https://doi.org/10.1007/978-3-031-15985-5_15
https://doi.org/10.1007/978-3-031-15985-5_15
Publikováno v:
Theory of Cryptography ISBN: 9783031223174
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0e66e0202471d1b4e4ec7b1257ce7e35
https://doi.org/10.1007/978-3-031-22318-1_7
https://doi.org/10.1007/978-3-031-22318-1_7
Publikováno v:
Theory of Cryptography ISBN: 9783030904586
TCC (1)
TCC (1)
In this work we consider information-theoretically secure MPC against an mixed adversary who can corrupt \(t_p\) parties passively, \(t_a\) parties actively, and can make \(t_f\) parties fail-stop. With perfect security, it is known that every functi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2571b1b0bd2f5b178766326057efd310
https://doi.org/10.1007/978-3-030-90459-3_20
https://doi.org/10.1007/978-3-030-90459-3_20
Publikováno v:
Advances in Cryptology – CRYPTO 2021-41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
This paper closes the question of the possibility of two-round MPC protocols achieving different security guarantees with and without the availability of broadcast in any given round. Cohen et al. [CGZ20] study this question in the dishonest majority
Publikováno v:
Topics in Cryptology – CT-RSA 2021-Cryptographers’ Track at the RSA Conference 2021, Virtual Event, May 17–20, 2021, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
The lack of privacy in the first generation of cryptocurrencies such as Bitcoin, Ethereum, etc. is a well known problem in cryptocurrency research. To overcome this problem, several new cryptocurrencies were designed to guarantee transaction privacy
Publikováno v:
Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I
Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021
Although they have been studied for a long time, distributed signature protocols have garnered renewed interest in recent years in view of novel applications to topics like blockchains. Most recent works have focused on distributed versions of ECDSA