On the adaptive security of the threshold BLS signature scheme

R Bacho, J Loss - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
… In this work, we revisit the security of the threshold BLS signature by showing … BLS signatures,
even when a trusted dealer distributes the keys. Recall that in order to create a signature

[HTML][HTML] BLS multi-signatures with public-key aggregation

D Boneh, M Drijvers, G Neven - URL: https://crypto. stanford …, 2018 - crypto.stanford.edu
… many BLS signatures on a common message, so that verifying the short multi-signature is
fast. … The original public keys are not needed for verifying the multi-signature. An important …

Subset-optimized bls multi-signature with key aggregation

F Baldimtsi, KK Chalkias, F Garillot… - Cryptology ePrint …, 2023 - eprint.iacr.org
… We follow the security proof of BLS signature in [21] up to a certain point - in particular they
provide reduction strategies to address 2 cases that may arise. In addition to those 2 cases, …

Performance of eddsa and bls signatures in committee-based consensus

Z Li, A Sonnino, P Jovanovic - Proceedings of the 5th workshop on …, 2023 - dl.acm.org
… (BLS) signature scheme [4] is an efficient signature scheme using pairing-friendly elliptic
curves. BLS … We start by recalling the standard BLS signature scheme. Let G1, G2, and G𝑇 be …

Security of BLS and BGLS signatures in a multi-user setting

MS Lacharité - Cryptography and Communications, 2018 - Springer
… ) signature scheme [7] and the Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signature
scheme [6]. In Sections 1.2–1.4, we review Schnorr and BLS signatures, unforgeability, and …

Bls signature scheme

D Boneh, S Gorbunov, H Wee, Z Zhang - Tech. Rep., 2019 - pdfs.semanticscholar.org
… compress n signatures into one … compress n signatures into one … – compressing
signature chains in PKI, SBGP – reducing bandwidth and storage in blockchains …

An effective integrity verification scheme of cloud data based on BLS signature

X Luo, Z Zhou, L Zhong, J Mao… - Security and …, 2018 - Wiley Online Library
… By signing the name of a file with an additional BLS signature, we can prevent an adversary
from tampering with the name. We use a hash function to ensure that the file tag, name, is …

Adaptively secure BLS threshold signatures from DDH and co-CDH

S Das, L Ren - Annual International Cryptology Conference, 2024 - Springer
… Since we want our final signature to be a standard BLS signature, and BLS signatures are
deterministic, these changes are delicate. Moreover, we embed the co-CDH challenge in such …

Stronger security for non-interactive threshold signatures: BLS and FROST

M Bellare, S Tessaro, C Zhu - Cryptology ePrint Archive, 2022 - eprint.iacr.org
signature schemes. They cover both fully non-interactive schemes (these are ones that have
a single-round signing protocol, the canonical example being thresholdBLS) … that BLS and …

Efficient Aggregatable BLS Signatures with Chaum-Pedersen Proofs

J Burdges, O Ciobotaru, S Lavasani… - Cryptology ePrint …, 2022 - eprint.iacr.org
… In this work we propose individual BLS signatures carry Chaum-… classical BLS signature
places the public key and signature … is used for the keys or signatures creates trade offs. We …