[HTML][HTML] A survey on blockchain technology and its security
H Guo, X Yu - Blockchain: research and applications, 2022 - Elsevier
Blockchain is a technology that has desirable features of decentralization, autonomy,
integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency …
integrity, immutability, verification, fault-tolerance, anonymity, auditability, and transparency …
Bft in blockchains: From protocols to use cases
A blockchain is a distributed system that achieves strong security guarantees in storing,
managing, and processing data. All blockchains achieve a common goal: building a …
managing, and processing data. All blockchains achieve a common goal: building a …
MuSig2: Simple two-round Schnorr multi-signatures
Multi-signatures enable a group of signers to produce a joint signature on a joint message.
Recently, Drijvers et al.(S&P'19) showed that all thus far proposed two-round multi-signature …
Recently, Drijvers et al.(S&P'19) showed that all thus far proposed two-round multi-signature …
On the adaptive security of the threshold BLS signature scheme
Threshold signatures are a crucial tool for many distributed protocols. As shown by Cachin,
Kursawe, and Shoup (PODC'00), schemes with unique signatures are of particular …
Kursawe, and Shoup (PODC'00), schemes with unique signatures are of particular …
FROST: flexible round-optimized Schnorr threshold signatures
C Komlo, I Goldberg - Selected Areas in Cryptography: 27th International …, 2021 - Springer
Unlike signatures in a single-party setting, threshold signatures require cooperation among
a threshold number of signers each holding a share of a common private key. Consequently …
a threshold number of signers each holding a share of a common private key. Consequently …
Fully adaptive schnorr threshold signatures
We prove adaptive security of a simple three-round threshold Schnorr signature scheme,
which we call Sparkle. The standard notion of security for threshold signatures considers a …
which we call Sparkle. The standard notion of security for threshold signatures considers a …
On the (in) security of ROS
We present an algorithm solving the ROS (R andom inhomogeneities in a O verdetermined
S olvable system of linear equations) problem mod p in polynomial time for ℓ> log p …
S olvable system of linear equations) problem mod p in polynomial time for ℓ> log p …
MuSig-L: Lattice-based multi-signature with single-round online phase
Multi-signatures are protocols that allow a group of signers to jointly produce a single
signature on the same message. In recent years, a number of practical multi-signature …
signature on the same message. In recent years, a number of practical multi-signature …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …
[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications
K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …
will play a crucial role in the security of emerging decentralized next-generation networked …